Two instances of hacked sites after enabling
-
Hi all, I don’t want to be alarmist, but perhaps you can offer some advice.
A couple of months back I enabled WPSC on a client site, and within 48hrs or so it was ‘hacked’ within embedded scripts in dozens of posts, that hijacked links on the site to redirect visitors off to ‘cutwin.com’, which I believe is an affiliate scheme of some sort.
Today, I’ve just finished clearing up another instance of this on another site, where links were doing the same thing – embedded scripts in posts linking off to cutwin.com. I had literally 2 hours ago enabled WPSC on it.
Neither site had had problems in the past, and in fact the latter is running through Sucuri firewall. On the second site in particular, WP and plugins were bang up-to-date – in fact I’d just been upgrading everything today, with only 4 weeks since the last round of upgrades.
Both sites are running in a reseller account (UK based, reputable), where each website is siloed, so if one is affected, others aren’t.
I don’t doubt the plugin – I know it’s used by hundreds of thousands of sites. I also have complete confidence in the authors and Automattic. It just seems too much of a coincidence that the two sites (out of dozens we manage) where I’ve seen ‘cutwin.com’ in embedded scripts, had recently had WPSC enabled on them. In both cases, the plugin was installed straight from the repository via ‘Plugins > Add New’
Have you seen anything like this before, or heard of cutwin.com embedded scripts? Could the directory that is created to hold the cached files, be set up with weak permissions on our host? – I didn’t get chance to check the permissions on the folder, I was too busy cleaning up the hack and it got overwritten. Any advice welcome…
- The topic ‘Two instances of hacked sites after enabling’ is closed to new replies.