Last Updated on December 1, 2011 by Dan Nedelko
Looks like there is another WordPress exploit out there dubbed Gumblar cn I was actually made aware of it through a pingback from Growmapcom on their Watch Out for Recent WordPress Gumblar PHP Exploit post
These attacks are extremely time consuming to clean up trust me Ive had to do it before in the past Its not a quick or easy thing to have to deal with at all
There is also an excellent explanation of Gumblar here Gumblar cn Exploit 12 Facts About This Injected Script
Please proactively protect yourself against this exploit
Update Im quoting a bit from Scansafes excellent QA about the exploit
Is this a cross site scripting XSS attack
No The compromises appear to be the result of stolen FTP credentials and direct manipulation of files on the Web server
What is the intent of the malware distributed through the Gumblar compromised websites
The malcode distributed via the compromised websites attempts to exploit PDF and Flash exploits in order to deliver malware that redirects infected users search engine results In these particular attacks the malcode appears to be targeting Internet Explorer users and Google search In addition the gumblarcn malcode installs a backdoor that connects to 7810929112 an IP address of a known botnet command and control that has historically been associated with malware engaged in malicious redirections
Reference blog post httpblogscansafecomjournal200958google serps redirections turn to botshtml
How do these malicious redirections work
Similar to a man in the middle attack these redirections occur as a result of a man in the browser attack The malcode injects itself into the browser process monitors the requests processed by the browser and injects fraudulent traffic In the case of the Google SERPs redirects the malcode replaces legitimate Google SERPs results with links pointing to malicious or fraudulent websites
Millions of websites have been compromised over the past year what makes these particular compromises unique
A typical series of website compromises reaches peak within the first week or so and subsequently begins declining in intensity as detection is added by signature vendors user awareness increases and website operators begin cleaning the affected sites This is why attackers are constantly pushing new waves of compromise
In the gumblarcn attacks the opposite is occurring As website operators attempt to clean up the original compromise or otherwise make changes to the original source code of the htm php and asp pages on their sites the gumblarcn compromise is injected The gumblarcn mal script appears to be dynamically generated and thus varies not only from site to site but also from page to page on the same site In addition the resulting mal script is heavily obfuscated further hampering signature detection methods As a result the gumblarcn compromises are increasing up 188 from last week and a 61 increase from yesterday
Here are some related articles Ive written that might be helpful
Best of Luck
Dan
[…] WordPress Exploit Gumblar .cn […]
[…] WordPress Exploit Gumblar cn by Dan Nedelko Posted by root 1 day 16 hours ago (http://dnedprod.wpengine.com) Looks like there is another wordpress exploit out there dubbed gumblar cn i was may want to subscribe to my rss feed for current and unique internet marketing strategies surveillance privacy powered by twitter tools comment now name required email address Discuss | Bury | News | WordPress Exploit Gumblar cn by Dan Nedelko […]
Good solution, thanks
As a wordpress blogger myself – this was actually quite interesting reading. Should always be aware of the threat of hacking and malicious attacks on you websites… always backup regularily
From WordPress Back to Drupal…
After several years of using WordPress I switched my blog back to Drupal. There’s several reasons for this, but some of the more important issues, to me anyway, included being able to easily do certain things like add external links to my “Pages” s…
Well that was much simpler than I was expecting. Thanks!