WordPress Exploit Gumblar .cn

By Dan Nedelko

May 12, 2009


Last Updated on December 1, 2011 by Dan Nedelko

Looks like there is another WordPress exploit out there dubbed Gumblar cn I was actually made aware of it through a pingback from Growmapcom on their Watch Out for Recent WordPress Gumblar PHP Exploit post

These attacks are extremely time consuming to clean up trust me Ive had to do it before in the past Its not a quick or easy thing to have to deal with at all

There is also an excellent explanation of Gumblar here Gumblar cn Exploit 12 Facts About This Injected Script

Please proactively protect yourself against this exploit

Update Im quoting a bit from Scansafes excellent QA about the exploit

Is this a cross site scripting XSS attack

No The compromises appear to be the result of stolen FTP credentials and direct manipulation of files on the Web server

What is the intent of the malware distributed through the Gumblar compromised websites

The malcode distributed via the compromised websites attempts to exploit PDF and Flash exploits in order to deliver malware that redirects infected users search engine results In these particular attacks the malcode appears to be targeting Internet Explorer users and Google search In addition the gumblarcn malcode installs a backdoor that connects to 7810929112 an IP address of a known botnet command and control that has historically been associated with malware engaged in malicious redirections

Reference blog post httpblogscansafecomjournal200958google serps redirections turn to botshtml

How do these malicious redirections work

Similar to a man in the middle attack these redirections occur as a result of a man in the browser attack The malcode injects itself into the browser process monitors the requests processed by the browser and injects fraudulent traffic In the case of the Google SERPs redirects the malcode replaces legitimate Google SERPs results with links pointing to malicious or fraudulent websites

Millions of websites have been compromised over the past year what makes these particular compromises unique

A typical series of website compromises reaches peak within the first week or so and subsequently begins declining in intensity as detection is added by signature vendors user awareness increases and website operators begin cleaning the affected sites This is why attackers are constantly pushing new waves of compromise

In the gumblarcn attacks the opposite is occurring As website operators attempt to clean up the original compromise or otherwise make changes to the original source code of the htm php and asp pages on their sites the gumblarcn compromise is injected The gumblarcn mal script appears to be dynamically generated and thus varies not only from site to site but also from page to page on the same site In addition the resulting mal script is heavily obfuscated further hampering signature detection methods As a result the gumblarcn compromises are increasing up 188 from last week and a 61 increase from yesterday

Here are some related articles Ive written that might be helpful

WordPress Injection Attack

Blocking Spam with WordPress

WordPress Security Plugins

Best of Luck

Dan

Reblog this post [with Zemanta]
author avatar
Dan Nedelko
Dan Nedelko is human being spinning around on this big blue marble with the rest of you, interested in Media // Music // Art // Family // Business // Founder of Honeypot Marketinghttp://hny.pt, Jacohmi, and Genuine Media & Development.

Dan Nedelko

About Dan Nedelko

A human being spinning around on this big blue marble with the rest of you, interested in Digital Marketing // Music // Art // Family // Business // Founder of http://hny.pt

  • […] WordPress Exploit Gumblar cn by Dan Nedelko Posted by root 1 day 16 hours ago (http://dnedprod.wpengine.com) Looks like there is another wordpress exploit out there dubbed gumblar cn i was may want to subscribe to my rss feed for current and unique internet marketing strategies surveillance privacy powered by twitter tools comment now name required email address Discuss  |  Bury |  News | WordPress Exploit Gumblar cn by Dan Nedelko […]

  • As a wordpress blogger myself – this was actually quite interesting reading. Should always be aware of the threat of hacking and malicious attacks on you websites… always backup regularily

  • From WordPress Back to Drupal…

    After several years of using WordPress I switched my blog back to Drupal. There’s several reasons for this, but some of the more important issues, to me anyway, included being able to easily do certain things like add external links to my “Pages” s…

  • {"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

    Want a FREE Membership to Marketer Knows?

    >