With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common. Recently, a vulnerability was discovered in tagDiv Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.
In this hack, users, when redirected, are taken to irritating pages with arbitrary URL and pishing reCAPTCHA images. The displayed text tries to trick visitors to allow browser notifications without disclosing the motive.
Moreover, Google will penalize you by blacklisting your website against Phishing and hacked website. The web browsers will display a warning message to visitors visiting your website.
The infused infection involves a code from either of the two website sites: cdn.allyouwant.online. and cdn.eeduelements.com. The former was used in the recent stages of this malicious campaign and the latter was used in the beginning.
Currently 1700+ sites with the cdn.eeduelements.com script and 500+ sites with the cdn.allyouwant.online script. The main people behind this WordPress exploit are tagDiv themes and the recently found (and already patched) vulnerability in a popular Ultimate Member plugin, which has 100,000+ active installations. The Vulnerability in the Ultimate Member Plugin is Unauthenticated Arbitrary File Upload. Although the vulnerability was fixed on August 9th, 2018.
Symptoms of WP Redirect Campaign: Ultimate Member Plugins Exploit:
- Index.php corrupted
- Unknown PHP file in the /wp-content/plugins/ultimate-member/includes/images/smiles directory
- Error logs show: wp-content/plugins/ultimate-member/assets/dynamic_css/dynamic_profile.php on line 5 and line 6
- The website gets redirected to unwanted sites (Adware)
- Popups are shown on visiting the homepage
- Credit card information is stolen
- Unknown files are created on the server
- Query files in WordPress & plugin folders modified
- Gibberish Code in index.php
This WordPress redirect infection uses several other attack vectors and several variants of the suspicious code. Here, are some steps to mitigate WordPress redirect:
- Update all themes and plugins to the latest version.
- Setting up HTTP Authentication preventing PHP file from direct access in the upload folder. This is to prevent unauthorized execution.
- The malware can be found and removed in the theme’s admin interface in case of tagDiv infection.
- Delete all PHP files in subdirectories under wp-content/uploads/ultimatemember/temp/ in the case of the Ultimate Member Plugin exploit.
These malicious redirect campaigns frequently change infection code and affected files. It is best to consult a security expert and ensure that your browser extensions and AV softwares are always patched and up-to-date.