{"id":13589,"date":"2014-12-16T22:32:26","date_gmt":"2014-12-16T15:32:26","guid":{"rendered":"http:\/\/tom.ji42.com\/?p=13589"},"modified":"2020-11-05T08:56:38","modified_gmt":"2020-11-05T01:56:38","slug":"wordpress-under-attack-100000-wp-websites-compromised-by-soaksoak-malware","status":"publish","type":"post","link":"https:\/\/tom.tomwork.net\/?p=13589","title":{"rendered":"WordPress under Attack, 100,000+ WP Websites compromised by SoakSoak Malware"},"content":{"rendered":"<h2>SoakSoak Malware Compromises 100,000+ WordPress Websites<\/h2>\n<p>News of a malware campaign against WordPress has been doing the rounds since owners and webmaster of wordpress blogs found out about websites getting blacklisted by Google. Around 11,000 domains had been blocked due to the latest malware campaign which has now swelled to 100,000. This campaign \u00a0has been brought by SoakSoak.ru, thus being dubbed the \u2018SoakSoak Malware\u2019 epidemic.<\/p>\n<h2><strong>The malware<\/strong><\/h2>\n<p><!--more--><\/p>\n<p>Once your website has been infected by the malware,\u00a0you may experience irregular website behavior including unexpected redirects to SoakSoak.ru web pages. You may also end up downloading malicious files onto your computer systems automatically without any knowledge. The attack vector for the malware is not yet known, as is the reason of this campaign. \u00a0This campaign has resulted in a loss both revenue and reputation for the WordPress blog owners who are blacklisted by Google.<\/p>\n<blockquote><p>SoakSoak malware modifies the file located at <i><b>wp-includes\/template-loader.php<\/b><\/i> which causes wp-<b><i>includes\/js\/swobject.js<\/i><\/b> to be loaded on every page view on the website and this \u201c<b><i>swobject.js<\/i><\/b>\u201d file includes a malicious java encoded script malware.<\/p><\/blockquote>\n<h2><strong>Security Net<\/strong><\/h2>\n<p>The security team which has been investigating the campaign \u2013\u00a0 <a href=\"http:\/\/blog.sucuri.net\/2014\/12\/soaksoak-malware-compromises-100000-wordpress-websites.html\" target=\"_blank\" rel=\"noopener noreferrer\">Sucuri<\/a> \u2013 \u00a0says that this campaign does not appear to be specifically targeted towards WordPress, \u00a0the victims seem to be blogs relying on its frame work. \u00a0So the fact that most of its victims are WordPress websites, may just be a coincidence.<\/p>\n<p>If you run any website and are worried about the potential risk of the infection to your website, Sucuri has provided a free SiteCheck tool here\u00a0<a href=\"http:\/\/sitecheck.sucuri.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">scanner<\/a> that will check your website for the malware. The exact method of intrusion has not been pointed out at this time, but numerous signals led to believe us all that many WordPress users could have fallen victim to this attack.\u00a0However, if you have enabled a Firewall, \u00a0CloudProxy or CDN service, you are protected from the SoakSoak malware campaign.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SoakSoak Malware Compromises 100,000+ WordPress Websites News of a malware campaign against WordPress has been doing the rounds since owners and webmaster of wordpress blogs found out about websites getting blacklisted by Google. Around 11,000 domains had been blocked due to the latest malware campaign which has now swelled to 100,000. This campaign \u00a0has been [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[13],"tags":[],"class_list":["post-13589","post","type-post","status-publish","format-standard","hentry","category-13"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6cOVM-3xb","_links":{"self":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/posts\/13589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13589"}],"version-history":[{"count":3,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/posts\/13589\/revisions"}],"predecessor-version":[{"id":24771,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/posts\/13589\/revisions\/24771"}],"wp:attachment":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}