Thousands of WordPress places targeted with malicious plugin back door attack


  • Security researchers found javaScript code installed four rear doors to WP-driven places
  • They also found a vulnerable plugin that enabled the acquisition of full site
  • There are patches and mitigation for all these vulnerabilities

A single piece of JavaScript code released no less than four separate rear doors of approx. 1,000 WordPress websites, according to a new report from cybersecurity scientists C/Side, which detailed the four back doors and explained how site -building users should protect themselves.

The analysis did not elaborate on how the malicious JavaScript came into these sites – we can assume either weak or compromised passwords, a vulnerable addition or the like. In any case, the code is served via CDN.Csyndication[dot]com, a domain mentioned on at least 908 sites.

Leave a Comment

Your email address will not be published. Required fields are marked *