Update WP Super Cache and W3TC Immediately

Remote Code Execution Vulnerability Disclosed

From http://blog.sucuri.net

Shame on us for not catching this a month ago when it was first reported, but it seems that two of the biggest caching plugins in WordPress have what we would classify a very serious vulnerability – remote code execution (RCE), a.k.a., arbitrary code execution:


Continue ReadingUpdate WP Super Cache and W3TC Immediately

Apache Binary Backdoors on Cpanel-based servers

From http://blog.sucuri.net

For the last few months we have been tracking server level compromises that have been utilizing malicious Apache modules (Darkleech) to inject malware into websites. Some of our previous coverage is available here and here.

However, during the last few months we started to see a change on how the injections were being done. On cPanel-based servers, instead of adding modules or modifying the Apache configuration, the attackers started to replace the Apache binary (httpd) with a malicious one. This new backdoor is very sophisticated and we worked with our friends from ESET to provide this report on what we are seeing.



Continue ReadingApache Binary Backdoors on Cpanel-based servers

WordPress Login – Brute Force Attack

From hostgator.com

There is a worldwide, highly-distributed WordPress attack that is ongoing. This attack is known to be using forged or spoofed IP addresses. We are actively blocking the most common attacking IP addresses across our server farm. The following steps can be used to secure (by password protection) wp-login.php for all WordPress sites in your cPanel account:


Continue ReadingWordPress Login – Brute Force Attack