Thousands of WordPress Websites Hacked with New Sign1 Malware


Sign1 malware targets WordPress websites, injecting malicious code that redirects visitors to scams or bombards them with ads – Sucuri researchers discovered this evasive malware, urging website owners to update software and implement security measures to protect their sites.

Cybersecurity researchers at Sucuri have uncovered a concerning new malware campaign targeting WordPress websites. Dubbed “Sign1,” the malware injects malicious code into vulnerable websites, ultimately redirecting visitors to scam sites or bombarding them with unwanted pop-up ads.

The new malware discovery emerged shortly after Check Point Software Technologies Ltd. disclosed a malicious campaign named FakeUpdates, which specifically targeted WordPress websites with malware.

Sign1 malware’s stealthy tactics make it a significant threat. The malware leverages time-based randomization to generate dynamic URLs, making it difficult for security software to identify and block them. Additionally, the code itself is obfuscated, further hindering detection.

Perhaps most concerning is Sign1’s ability to target visitors from specific websites, such as popular search engines and social media platforms. This suggests a level of sophistication, potentially allowing attackers to focus on users they deem more susceptible to scams.

Sucuri’s report estimates that over 39,000 WordPress websites have been infected with Sign1 thus far. Website owners are urged to take immediate action to protect their sites and visitors.

How to Protect Your WordPress Website from Sign1

If you are using WordPress as your website’s content management system (CMS), here are some simple yet vital steps to protect the website from Sign1 and other similar malware:

  • Update WordPress core, themes, and plugins regularly. Outdated software often contains vulnerabilities that attackers exploit.
  • Implement strong security practices. This includes using secure passwords, enabling two-factor authentication, and keeping backups of your website data.
  • Use a reputable website security scanner. Regularly scan your website for malware and vulnerabilities.
  • Be cautious when installing plugins. Only install plugins from trusted sources and with good reviews.

Website owners who suspect their site may be infected with Sign1 malware should:

  • Contact a security professional or your WordPress hosting company. They can help identify and remove the malware.
  • Change all website passwords. This includes the WordPress admin password, FTP password, and database password.

Nevertheless, the discovery of Sign1 malware goes on to show the vulnerable state of websites. With more than 835 million sites using WordPress even a small threat could end up compromising a staggering number of sites.

It’s crucial to stay informed about the latest security vulnerabilities and take proactive steps to protect your website. Security researchers like Sucuri play a vital role in identifying and mitigating these threats.

  1. Hackers Hit WordPress Sites with Balada Malware
  2. Tips for Using Uploader Widgets on WordPress Blogs
  3. Zero-Day Exploit Threatens 200,000 WordPress Sites
  4. Database Malware Strikes Vulnerable WordPress Sites
  5. 5 Signs your WordPress Site is Hacked (And How to Fix It)





Source link