On Wed, 3 Sep 2014, Spectrum CS wrote:

I thought I'd share this incase its helpful to any body else. Today a series of emails passed though our spamassassin filter cleanly which had URLs to Wordpress sites like the following...

hXXp://ticket-deals.de/wp-content/themes/xblog/index.php?id=741693561
hXXp://vertaser.ru/wp-includes/js/tinymce/plugins/media/xblog/index.php?id=225070296

Clicking those links bounces you over to hXXp://royalmail-service.co.uk and using the ruse that they have missed a parcel delivery encourages end users to enter the capchta. They then end up downloading a 200KB track_c4ca4238a0b923820dc.zip file which contains a track_89258099.exe file which is infected with the Cryptolocker virus.

I've just crafted the following rule in order to block any more of these messages reaching end users as having now looked though the logs I've found about 15 have come though today (all originating from the same IP in russia?!)

uri __SCS_HACKED_WORDPRESS_URIa /wp-content\/(plugins|themes)/is
uri  __SCS_HACKED_WORDPRESS_URIb /wp-includes/is

There's already a sandbox rule for wp-admin. These are easy enough to add to evaluate performance without affecting scores. I will do that.

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  All I could think about was this bear is so close to me I can
  see its teeth. I could have kissed it. I wished I had a gun.
                                             -- Alyson Jones-Robinson
-----------------------------------------------------------------------
 14 days until the 227th anniversary of the signing of the U.S. Constitution

Reply via email to