Cloned Spam Sites in Subdirectories

less than 1 minute read

Cloned Spam Sites in Subdirectories<p>In a recent post, we covered how attackers were abusing server resources to create WordPress sites in subdirectories and distribute spam. By adding a complete WordPress CMS installation into a directory and using the victim’s database structure, attackers were able to inject ads and promote their products – a very bold move.</p>

This time around, attackers used a different technique and structure to accomplish the same task.

Infection Patterns

Instead of adding WordPress subsites and using the local database, they decided to fetch all of the information from external sources under their control.

Continue reading Cloned Spam Sites in Subdirectories at Sucuri Blog.

Spotlight on Women in Cybersecurity

less than 1 minute read

Sucuri is committed to helping women develop their careers in technology. On International Women’s Day, Sucuri team members share their insights into workin...

Hacked Website Trend Report – 2018

less than 1 minute read

We are proud to be releasing our latest Hacked Website Trend Report for 2018. This report is based on data collected and analyzed by the GoDaddy Security / ...