""ET WEB_SERVER Compromised WordPress Server pulling Malicious JS""

SID: 2015480

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Wordpress, affected_product Wordpress_Plugins, attack_target Web_Server, created_at 2012_07_17, deployment Datacenter, signature_severity Major, tag Wordpress, updated_at 2012_07_17

Reference:

Protocol: tcp

Source Network: $HTTP_SERVERS

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "/net/?u="

  • Value: "Host|3a| net"

  • Value: "net.net"

  • Value: "User-Agent|3a| Mozilla/4.0 (compatible|3b| MSIE 8.0|3b| Windows NT 6.0)"

Within: 7

PCRE: "/^Host\x3a\snet[0-4]{2}net.net\r?\n$/Hmi"

Special Options:

  • http_uri

  • http_header

  • http_header

  • http_header

source