Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Malware families distributed through malicious campaign targeting WordPress sites

Malware families distributed through malicious campaign targeting WordPress sites

2014/12/24

Softpedia - (International) Researchers with Zscaler identified a malware distribution campaign utilizing more than 50 WordPress Web sites used by exploit kits as malware drop sites. The researchers observed the Upatre and Hencitor malware droppers, Vawtrack (also known as NeverQuest) banking malware, and Extrat Xtreme remote access trojan (RAT) among the malware being distributed in the campaign.

Source: http://news.softpedia.com/news/Malware-Families-Distributed-Through-Malicious-Campaign-Targeting-WordPress-Sites-468301.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:22:56