News

Beware of compromised WordPress sites redirecting users to tech support scam pages

Scammers infect WordPress sites to redirect victims

Tech support scammers strike again, and this time, they found a way to compromise legitimate WordPress websites. In September 2018, experts from Sucuri reported that hackers are inserting malicious codes into .js, .php files as well as in WP databases. The malicious code redirects site visitors to scam pages that display fraudulent pop-ups with scary messages. Usually, they state there is something wrong with victim’s computer.

Jérôme Segura, a well-known malware intelligence analyst, says that compromised websites contained an encoded piece of code, which typically was placed in the HTML header. Alternatively, the code would include a code that points to a Javascript code set externally.

In several scenarios, the script lies in the “wp_posts” table in the WP database. Interestingly, there is no code obfuscation. Representatives from Sucuri labs say that location of the malware varies, and that common versions of the virus are in .js files containing jquery in their names. Experts also add that scammers can compromise WordPress websites via outdated plugins, a common and probably the main security flaw in WP websites. Some of the targets they named were very old tagDiv themes (NewsMag, NewsPaper, others) and unpatched Smart Google Code Inserter plugin.

Fraudsters come up with new ideas since Google started banning fake tech support ads

The new attack wave rolled out soon after Google’s announcement to strictly restrict advertisements by third-party tech support providers. The tech giant took such measures to lower the number of fraudsters in the tech support market.

Therefore, tech support scammers now aim at legitimate websites and try to advertise by illegally injecting codes in reputable sites. They may also attempt to exploit legitimate advertising platforms to present themselves as trustworthy service providers.

The attackers promote traditional fake support pages urging the victim to call for support immediately. Usually, the deceptive pop-up includes such and similar lines:

Windows Warning Alert
Malicious Spyware/Riskware Detected
Error# 0x80072ee7

Please call us within the next 5 minutes…

Additionally, experts point out that scammers have fired shots not only at website users but also at advertisers. According to Jérôme Segura’s report to Bleeping Computer, scammers are “pushing ads for some geolocations as well as user agents.” He also notices malicious campaigns that reroute victims to sites injecting CoinHive JavaScript miner. These sites then use the victim’s computer’s resources to mine Monero cryptocurrency until the malicious page is closed.

Recent Posts

Private Internet Access Review 2022: Fast, Secure & Cheap VPN

Private Internet Access (PIA) VPN maintains its long-term role as a leader Private Internet Access…

24 hours ago

Remove XCBG Ransomware Virus (DECRYPT .xcbg FILES)

XCBG ransomware aims to lock your files and demand a ransom XCBG ransomware is a…

2 days ago

Remove BPQD Ransomware Virus (DECRYPT .bpqd FILES)

BPQD ransomware encrypts all computer files, demands a ransom from the user BPQD ransomware is…

2 days ago

Remove KQGS Ransomware Virus (DECRYPT .kqgs FILES)

KQGS ransomware is a hostile computer virus designed to encrypt all of your files KQGS…

2 days ago

Remove VTYM Ransomware Virus (DECRYPT .vtym FILES)

VTYM ransomware description: a virtual menace to your files stored on the computer VTYM ransomware…

1 week ago

Remove FOPA Ransomware Virus (DECRYPT .fopa FILES)

FOPA ransomware is a new threatening computer virus that encrypts your files FOPA ransomware virus…

1 week ago