Hundreds of GoDaddy sites caught up in hacking campaign
Backdoor generates spammy Google search results
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
A new hacking campaign infecting hundreds of siteshostedby GoDaddy-hosted sites has been uncovered.
An investigation by the Wordfence Incident Response team found more than 280 websites hosted withGoDaddy’sManaged WordPress service were infected with a backdoor.
Among the compromised services are MediaTemple, tsoHost, 123Reg, Domain Factory, Heart Internet, and Host Europe, with a total of 298 sites found to be infected.
We’re looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn’t take more than 60 seconds of your time. Thank you for taking part.
Click here to start the survey in a new window«
This unnamed backdoor, it was further explained, has been in use for at least seven years. The threat actors add it to the beginning of wp-config.php and its goal seems to be to generate spammyGooglesearch results, including resources customized to the infected site.
Russian TLD
“If a request with a cookie set to a certain base64-encoded value is sent to the site, the backdoor will download a spam link template from a command and control (C2) domain – in this case t-fish-ka[.]ru – and save it to an encoded file with a name set to the MD5 hash of the infected site’s domain,” the researchers explained. “For example, the encoded file for ‘examplesite.com’ would be named 8c14bd67a49c34807b57202eb549e461, which is a hash of that domain.”
The C2 domain has a Russian top-level domain, but there’s nothing to indicate that this particular campaign has anything to do with Russia’s ongoing invasion of Ukraine.
GoDaddy breach exposes 1.2 million customer accounts>The Google Play Store is littered with dangerous trojans>GoDaddy suffers embarrassing phishing attack
The researchers are yet to discover how the threat actors made their way into GoDaddy’s services, speculating that it might be linked to last year’s attack on the company’s systems. In 2021, GoDaddy reported of an unknown attacker accessing its systems used to provision its Managed WordPress sites.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Customers of GoDaddy’s Managed WordPress platform are advised to manually analyze their site’s wp-config.php file, or run a scan with amalwaredetection solution, to make sure their premises are clean.
Those that do find something can use the instructions found onthis link, to clean up their sites of any malicious code orviruses.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics
This new phishing strategy utilizes GitHub comments to distribute malware
iStorage Group acquires Kanguru Solutions as it looks to expand security offering