-
2022年2月28日
Dear blog owner and visitors,
This blog had been infected to serve up Gootloader malware to Google search victims, via a common tactic known as SEO (Search Engine Optimization) poisioning. Your blog was serving up 57 malicious pages. Your blogged served up malware to 19 visitors.
I tried my best to clean up the infection, but I would do the following:
- Upgrade WordPress to the latest version (one way the attackers might have gained access to your server)
- Upgrade all WordPress themes to the latest versions (another way the attackers might have gained access to your server)
- Upgrade all WordPress plugins (another way the attackers might have gained access to your server), and remove any unnecessary plugins.
- Verify all users are valid (in case the attackers left a backup account, to get back in)
- Change all passwords (for WordPress accounts, FTP, SSH, database, etc.) and keys. This is probably how the attackers got in, as they are known to brute force weak passwords
- Run antivirus scans on your server
- Block these IPs (5.8.18.7 and 89.238.176.151), either in your firewall, .htaccess file, or in your /etc/hosts file, as these are the attackers command and control servers, which send malicious commands for your blog to execute
- Check cronjobs (both server and WordPress), aka scheduled tasks. This is a common method that an attacker will use to get back in. If you are not sure, what this is, Google it
- Consider wiping the server completly, as you do not know how deep the infection is. If you decide not to, I recommend installing some security plugins for WordPress, to try and scan for any remaining malicious files. Integrity Checker, WordPress Core Integrity Checker, Sucuri Security,
and Wordfence Security, all do some level of detection, but not 100% guaranteed - Go through the process for Google to recrawl your site, to remove the malcious links (to see what malicious pages there were, Go to Google and search site:your_site.com agreement)
- Check subdomains, to see if they were infected as well
- Check file permissions
Gootloader (previously Gootkit) malware has been around since 2014, and is used to initally infect a system, and then sell that access off to other attackers, who then usually deploy additional malware, to include ransomware and banking trojans. By cleaning up your blog, it will make a dent in how they infect victims. PLEASE try to keep it up-to-date and secure, so this does not happen again.
Sincerly,
The Internet Janitor
Below are some links to research/further explaination on Gootloader:
https://news.sophos.com/en-us/2021/03/01/gootloader-expands-its-payload-delivery-options/
https://news.sophos.com/en-us/2021/08/12/gootloaders-mothership-controls-malicious-content/
https://www.richinfante.com/2020/04/12/reverse-engineering-dolly-wordpress-malware
https://blog.sucuri.net/2018/12/clever-seo-spam-injection.html
-
2020年3月1日
この数か月、人類は目に見えぬ小さな敵に脅かされている。
様々なイベント事が次々と中止になり、ついに東京オリンピックも中止、という声まで上がっている。
公立の学校までもが休校となった。
巷には、様々なデマが飛んでいる。
相手は熱にとても弱い、冷たい水を飲まずにお湯を飲むこと、などというのも、その一種
でも、考え方によれば先ずは免疫力を付ける事、これはどんな病気にも共通の原理。
身体を冷やせば、免疫力は当然落ちる。
その意味では、水を飲まずにお湯を飲めというのは、正しいと言える。
少しでも早くに、この見えない敵との戦いを終息させたいものだ。
その為に、我々は何をしたら良いのか?
先ずは拡散させない事、
外出時はマスク、メガネ、出来たら手袋を着用する。
無駄な外出をせず、自宅待機?・・・・
何となく寂しい気もするけれど、このくらいが我々に出来る事かも、