There are a number of compromised sites on the popular blogging platform, WordPress, which, according to a Trend Labs report, are actively infecting users with the CRIDEX worm.

The infections are part of a social engineering campaign that lures users with emails purporting to come from trusted sources like LinkedIn and the Better Business Bureau, Trend Labs warned.

E-mails purporting to come from the Better Business Bureau informs its recipients of a (non-existent) complaint lodged against his or her business. The email includes a link to the “Complaint Report,” which leads to one of the infected WordPress sites.

Phony LinkedIn emails pose as invitation notifications and pending messages. They include a number of links, all of which lead to compromised WordPress sites.

According to Trend researchers, users who click the links are subject to Web based attacks that target a vulnerability in Adobe’s Reader and Acrobat software (CVE-2010-0188) and a common Windows Help Center vulnerability (CVE-2010-1885). After exploiting the vulnerabilities, attackers push copies of the Blackhole exploit kit to infect users with the CRIDEX worm.

Trend Labs reports that WORM_CRIDEX.IC is generating a number of random domains using domain generating algorithms (DGA). The technique is commonly used to evade law enforcement and botnet take-downs. The behavior of the sample is dependent upon the specific configuration file, which, in Trend Labs case, was unavailable to them. However, based on their static analysis, the malware is capable of executing and deleting files and retrieving certificates from a certificate store.

This isn’t the first time that WordPress sites have been used to push  the Blackhole Exploit kit. In November of last year, similar reports surfaced in which WordPress users were being re-directed to servers hosting the Blackhole kit.

Categories: Malware, Social Engineering, Web Security

Comments (2)

  1. Jan van Niekerk
    1

    The wordpress installation allows and practically forces beginners users to set their user name and password to ‘admin’ and ‘admin’. The ‘password strength’ thing is your only warning that you are doing something really bad and stupid, and it is a tasteful pink. The wordpress developers say this is not a security problem as such. Not a bug. Won’t fix.

  2. Nuh uh
    2

    Actually when you install WordPress (via Scimple Scripts usually) your password is randomly generated and sent to you. You should still change your UN (and pass if you want) but it’s not set to admin/admin.

Comments are closed.