When I logged into my admin account for my WordPress blog, I was surprised to find this waiting for me in the dashboard:
UPDATE 07/11/2008: Watch a short (less than 60 seconds) video demonstrating the dashboard hijack.
UPDATE 08/11/2008: Cleaning up after the WordPress 2.6.4 incident. Note that I did not install the fake 2.6.4, so it’s not a clean up for that scenario.
Wordpresz.org appears to be a spoof of wordpress.org. With the exception of the download link and one or two others (Facebook link, etc.) all the pages lead back to the front/home page.
I’ve just downloaded the wordpresz 2.6.4 offering to see what’s different. If I find anything, and if time permits, I’ll update this post.
22:26 UPDATE
Just looking at the respective home pages for WordPresz.org vs WordPress.org, a few differences jump out – check out items 1, 2 and 3 below.
Item 1 – the download size is too round and is incorrect, it should be about 1.4mb in this case.
Item 2 – these are randomised over at WordPress.org, but are static at WordPresz.org.
Item 3 – The real WordPress.org has a “Showcase” link included.
Indeed, the source for both home pages reveals that WordPresz.org is simply an earlier snapshot of WordPress.org.
Looking at domain data for WordPresz.org, there are a few holes here. Google hasn’t indexed this site? What about the Alexa ranking?
Whereas, WordPress.org is pretty popular with Google and has an Alexa ranking.
23:59 UPDATE
Via Clayton, this may well be part of the problem. There’s further comment on the WordPress support forum too. I’ve since upgraded to 2.6.3 via the WordPress.org download.
The moral of this story: keep on top of WordPress updates and security fixes.
**
Images grabbed using TechSmith‘s SnagIt – an essential tool for developers and bloggers alike. With thanks to Betsy Weber
wp-includes/pluggable.php has extra lines in it that appear to call a script on that site to ‘do stuff’ with your cookies if you have more than 5 users…
Are they just copying cookies of large sites hoping that someone is logged in as admin somewhere?
Hi Craig,
Excellent post. Have you considered passing this info on the The Register, they might be interested.
Cheers
Barry
[…] here, you may want to subscribe to my RSS feed. Thanks for visiting!Sophos are now identifying my earlier post about WordPresz 2..6.4 as […]
[…] IP (209.160.33.108) with a fake online pharmacy – livepills.com. A brief summary by Sophos of Craig Murphy’s alert issued on Monday : “Craig talks about how when he logged in to his admin account in WordPress he […]
[…] Read more at The Register – Fake site punts Trojanised WordPress and additional analysis at the sources blog. […]
[…] and Sophos has since detected the malicious code as WPHack-A Trojan. According to posters on Craig Murphy’s Blog the Trojanised version of pluggable.php attempt to steal users cookies if you have five or more […]
[…] kurze Stellungsnahme durch Sophos zur Meldung von Craig Murphy lautet wie folgt: “Craig talks about how when he logged in to his admin account in WordPress he […]
Great catch Craig. All the publicity isn’t that bad either. These crafty crackers are getting annoying! I wonder how many people they fooled?
[…] sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] Murphy has all the details. The fake site is offline at this moment, but this incident serves as a good reminder to keep your […]
[…] is reporting via Craig Murphy on a typosquatting site that is offering a fake download version of WordPress that could open your […]
[…] seems there has been an attempt recently to distribute a trojaned version of WordPress via some form of phishing scam. It seems this attack relied on exploiting an old version of […]
[…] sürümünü duyurmuşlar.. Tamamen zararlı kodlar içeren bu sürümü kesinlikle kullanmayın.. Şuradan bahsi geçen sitenin görüntülerine ulaşabilirsiniz.. Siteye direkt link […]
[…] sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
that version has a backdoor in it which is designed to install malware to your computer and steal details of the users
[…] Tools Collection (en inglés) – Westi on WordPress (en inglés) – The Register (en inglés), y en – The Social Programmer (en inglés) Esta entrada fue escrita por FrankPereiro, el 7/Nov/2008 a las 0:33, archivado en […]
[…] sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] Craig Murphy – WordPress 2.6.4 Fake? […]
[…] seems there has been an attempt recently to distribute a trojaned version of WordPress via some form of phishing scam. It seems this attack relied on exploiting an old version of […]
[…] sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] Tools Collection: Fake WordPress Site Kas.07, 2008 in WordPress news Many sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] seems there has been an attempt recently to distribute a trojaned version of WordPress via some form of phishing scam. It seems this attack relied on exploiting an old version of […]
[…] WordPresz 2.6.4 – fake? от Craig Murphy […]
[…] Murphy war eines der Opfer die der Faker fast erwischt hätte: “WordPresz 2.6.4 – fake?” […]
[…] dikkatli olun. Oceangray’in yazısında sitenin ekran görüntülerinin yayınlandığı bağlantı da verilmiş. Bu tuzağa […]
[…] du kan lese av denne bloggposten og denne bloggposten, så kan litt kjedelige ting skje hvis du følger med i […]
[…] brief summary by Sophos of Craig Murphy’s alert issued on Monday : “Craig talks about how when he logged in to his admin account in WordPress he […]
[…] sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] Tools Collection: Fake WordPress Site Kas.08, 2008 in WP-RSS Many sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] seems there has been an attempt recently to distribute a trojaned version of WordPress via some form of phishing scam. It seems this attack relied on exploiting an old version of […]
[…] you may want to subscribe to my RSS feed. Thanks for visiting!As many of you are probably aware, earlier this week I noticed that my trusty WordPress blog was duping me into downloading and installing an essential […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
[…] 的討論區上有人提到,他在後台看到了一個RSS 訊息,要求用戶立刻升級到wordpress […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
[…] “upgraded” to “2.6.4″, then you have installed a fake trojan version (more details here and here). If you’ve “upgraded” to 2.6.4, delete your wp-admin and wp-includes folders and […]
[…] “upgraded” to “2.6.4″, then you have installed a fake trojan version (more details here and here). If you’ve “upgraded” to 2.6.4, delete your wp-admin and wp-includes folders and […]
[…] WordPress Site Nov.07, 2008 in WordPress Stuff Visited 10 times, 3 so far today Many sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
Thanks for warning and detailed notes. Users must be warned about this malicious code site. That is offline now though.
[…] CraighMurphy han detectado una versión falsa de WordPress, que tiene un nombre similar, haciéndose llamar […]
[…] sites across the blogosphere are reporting a fake website that is distributing a backdoored version of […]
[…] seems there has been an attempt recently to distribute a trojaned version of WordPress via some form of phishing scam. It seems this attack relied on exploiting an old version of […]
[…] Craig Murphy – WordPresz 2.6.4 – fake? […]
[…] The code is so obscure, that no static analysis tool can inspect it, or security auditor would normally take the time out to look at it, and yet it may contain an XSS or DOM injection, or it may contain malware if the download is corrupted, or a fake version comes out. […]
[…] sürümünü duyurmuşlar.. Tamamen zararlı kodlar içeren bu sürümü kesinlikle kullanmayın.. Şuradan bahsi geçen sitenin görüntülerine […]