sometimesfree.biz – nasty injection that Wordfence missed
-
One of the sites we look after got hit with nasty code injected throughout the site. It inserted a javascript link to a file hosted at sometimesfree.biz
The file caused visitors to the site to get redirected to a page that tries to install a Chrome plugin. The script adds a cookie called “crazytime” with a value of 1 with a 12 hour expiry, so that visitors are only redirected on their first visit, and then if they try to go the domain again it then works fine.
We think the hackers might be using SQL injection, because the link to the javascript is inserted in hundreds of places throughout the site in the posts table and a couple of times in the options table. The first time the site was hit we didn’t have Wordfence installed on it. But then we cleaned up the database and installed Wordfence including configuring the firewall. Wordfence is supposed to stop SQL injection, but within 1 week the site was hacked again and over 1300 entries of the the same script code was injected through the site.
We don’t know where they got in, but the sites that have been hit all use Contact Form 7, where as our sites that are fine all use Gravity Forms.
Questions:
* Does Wordfence do database scans to find malicious code?
* If so, is sometimesfree.biz on Wordfence’s list of malicious code to warn about?
* Can Wordfence identify (and stop) code like sometimesfree.biz being inserted in posts? And can it show how the hackers tried to insert the code if that does happen?
- The topic ‘sometimesfree.biz – nasty injection that Wordfence missed’ is closed to new replies.