Linux malware leverages plugin exploits to backdoor WordPress sites
Threat Level – Red | Vulnerability Report
Download PDFWordPress sites are being exploited by an unidentified strain of Linux malware that exploits flaws in plugins and compromises the sites by injecting malicious JavaScripts that are run sequentially until one of them succeeds. The malware targets both 32-bit and 64-bit Linux systems, enabling the malicious user to execute commands remotely.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox