Linux malware leverages plugin exploits to backdoor WordPress sites

Threat Level – Red | Vulnerability Report
Download PDF

WordPress sites are being exploited by an unidentified strain of Linux malware that exploits flaws in plugins and compromises the sites by injecting malicious JavaScripts that are run sequentially until one of them succeeds. The malware targets both 32-bit and 64-bit Linux systems, enabling the malicious user to execute commands remotely.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox