Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes.
WordPress websites were injected with the same iframe during the last days, that is serving content from sites as thepiratebay(dot)in(dot)ua.
“THIS IS NOT AN OFFICIAL PIRATE BAY MIRROR.”
The fake Pirate Bay site is pushing “the Nuclear exploit kit with an iframe” infecting making vulnerable users.
The Nuclear exploit kit landing page is loaded trough the Flash exploit CVE-2015-0311 designed to push a banking Trojan, meaning that if the user has an outdated flash player he will get infected when visiting the site.
“It’s possible this latest wave of attacks is somehow connected with the ‘SoakSoak’ campaign and its authors, although it is too early to tell at this point” wrote Jérôme Segura, from Malwarebytes, in a blog post. “To avoid getting their sites hacked, WordPress users need to check that they are running the latest WP install and that all their plug-ins are up to date.”
Security wise, as Jérôme said, it’s always important for you (if you own any website) to keep your software updated with the last releases to avoid this type of problems.
The experts don’t exclude a link between this malware campaign with the “SoakSoak” campaign.
About the Author Elsio Pinto
Edited by Pierluigi Paganini
(Security Affairs – Pirate Bay, malware)