NextGEN Gallery Hacked by Spammers
-
Despite closed relays on the server, hardware firewall, and all the other precautions of a quality dedicated server, the one WordPress 4.0 website with NextGEN Gallery is being hacked for spamming, even under version 2.0.66.29, for the last three months.
The current script was found at /home/account/public_html/wp-content/plugins/nextgen-gallery/products/inc.php it was being posted to send mail: [13/Oct/2014:08:24:14 -0500] “POST /wp-content/plugins/nextgen-gallery/products/inc.php HTTP/1.1” 200 65 “-” “Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.7.6)”
30 IP’s were posted to it, using the website as a spam generating workstation. We have the top techs at Wiredtree.com monitoring the problem, but NextGEN continues to be breached without use of account passwords, despite all safeguards.
The breach and activity is done in such a way as to evade malware scans and user and colocation center awareness. We found it only because our ability to send 30 emails was blocked due to server limits reached.
Simply a warning for anyone researching, NextGEN Gallery is being effectively exploited by Chinese hackers for the purpose of spamming with multiple IPs, at the demise of your domain integrity, email load and IP assigned.
- The topic ‘NextGEN Gallery Hacked by Spammers’ is closed to new replies.