Thousands of WordPress sites attacked with malicious rear attacks


  • Security researchers found the JavaScript code by installing four rear doors on places with WP
  • They also found a vulnerable complement that enables the full acquisition of the website
  • There are patches and mitigations for all these vulnerabilities.

A single piece of JavaScript code deployed no less than four separated rear doors in approximately 1,000 WordPress websites, according to a new report by cybersecurity researchers C/Side, which detailed the four rear and explained how users of the website builder must protect themselves.

The analysis did not elaborate how the malicious JavaScript reached these websites; We can assume weak or compromised passwords, a vulnerable or similar complement. In any case, the code is served through CDN.CSyndion[dot]com, a domain mentioned in at least 908 websites.

Leave a Comment

Your email address will not be published. Required fields are marked *