""ET WEB_SERVER Compromised WordPress Server pulling Malicious JS""
SID: 2015480
Revision: 1
Class Type: trojan-activity
Metadata: affected_product Wordpress, affected_product Wordpress_Plugins, attack_target Web_Server, created_at 2012_07_17, deployment Datacenter, signature_severity Major, tag Wordpress, updated_at 2012_07_17
Reference:
Protocol: tcp
Source Network: $HTTP_SERVERS
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "/net/?u="
-
Value: "Host|3a| net"
-
Value: "net.net"
-
Value: "User-Agent|3a| Mozilla/4.0 (compatible|3b| MSIE 8.0|3b| Windows NT 6.0)"
Within: 7
PCRE: "/^Host\x3a\snet[0-4]{2}net.net\r?\n$/Hmi"
Special Options:
-
http_uri
-
http_header
-
http_header
-
http_header