blog.sucuri.net Open in urlscan Pro
2a02:fe80:1010::5  Public Scan

URL: https://blog.sucuri.net/2024/10/indonesian-gambling-redirect-hiding-in-plain-sight.html
Submission Tags: @nominet_threat_intel feedly-filtered-v1.0 reference_article_link confidence_null cluster_16422227 Search All
Submission: On October 31 via api from GB — Scanned from GB

Form analysis 2 forms found in the DOM

GET https://blog.sucuri.net/

<form role="search" method="get" class="search-form" action="https://blog.sucuri.net/"> <label class="sr-only">Search for:</label>
  <div class="cs-input-group"> <input type="search" value="" name="s" data-swplive="true" data-swpengine="default" data-swpconfig="default" class="search-field" placeholder="Search the blog" required="" autocomplete="off"
      aria-owns="searchwp_live_search_results_6723aadfe00e2" aria-autocomplete="both"
      aria-label="When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures."> <button type="submit" class="search-submit">Search</button>
  </div>
</form>

GET https://blog.sucuri.net/

<form role="search" method="get" class="search-form" action="https://blog.sucuri.net/"> <label class="sr-only">Search for:</label>
  <div class="cs-input-group"> <input type="search" value="" name="s" data-swplive="true" data-swpengine="default" data-swpconfig="default" class="search-field" placeholder="Search the blog" required="" autocomplete="off"
      aria-owns="searchwp_live_search_results_6723aadf148ed" aria-autocomplete="both"
      aria-label="When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures."> <button type="submit" class="search-submit">Search</button>
  </div>
</form>

Text Content

 * Products
   * Website Security Platform
   * Website Firewall (WAF)
   * Multi-Site plans
   * Custom & Enterprise Plans
   * Partnerships
 * Features
   * Detection
     Website Monitoring & Alerts
   * Protection
     Future Website Hacks
   * Performance
     Speed Up Your Website
   * Response
     Help For Hacked Websites
   * Backups
     Disaster Recovery Plan
 * Resources
   * Guides
   * Webinars
   * Infographics
   * Blog
   * SiteCheck
   * Reports
   * Email Courses
 * Pricing
 * Immediate Help
 * Login

 * Products
   * Website Security Platform
   * Website Firewall (WAF)
   * Multi-Site plans
   * Custom & Enterprise Plans
   * Partnerships
 * Features
   * Detection
     Website Monitoring & Alerts
   * Protection
     Future Website Hacks
   * Performance
     Speed Up Your Website
   * Response
     Help For Hacked Websites
   * Backups
     Disaster Recovery Plan
 * Resources
   * Guides
   * Webinars
   * Infographics
   * Blog
   * SiteCheck
   * Reports
   * Email Courses
 * Pricing
 * Immediate Help
 * Login

 * Immediate Help

Login
Login

New Customer?

Sign up now.
 * Submit a ticket
 * Knowledge base
 * Chat now

Search for:
Search

 * Website Malware Infections
 * WordPress Security


INDONESIAN GAMBLING REDIRECT HIDING IN PLAIN SIGHT

Kayleigh Martin
 * October 30, 2024



Many pieces of malware found over the years have been complex and difficult to
find. Attackers often obfuscate their code to make it harder to track. Some
pieces of malware require extensive reviews to uncover. But in other instances,
that is not always the case. Threat actors find new ways to inject malware to
avoid detection, and in some situations, they hide their malicious code in plain
sight. Recently, I discovered a cleverly disguised malicious redirect, where
attackers leveraged a popular redirect plugin in a WordPress site. By routing
through an intermediary domain, they initiated the redirect process in a way
that evaded detection.

Let’s review this injection more in depth.


REDIRECT SYMPTOMS

A client recently came to us concerned that their site was redirecting to an
Indonesian gambling website, as seen below:



Upon reviewing the symptoms, the infected website took a handful of seconds to
load before the redirect occurred. Additionally, it occurred even with all
javascript disabled, indicating it was not a script injection. The gambling
domain the victim’s website redirected to was surfatech-tis[.]com. However, I
came up empty handed when searching for this domain in the files and database.
How could this be? In other samples found in the past, redirects like this that
cannot be found by searching the domain via plain text are usually obfuscated in
some fashion. More extensive reviews were performed and yet, I still came up
short. Another tactic I decided to employ was to look at the recently modified
files. That is when I stumbled upon a plugin called 301 redirects, which was
added 2 days prior to my search. I decided to look at the redirects added in
that plugin which revealed the malicious redirect chain.


UNCOVERING THE REDIRECT VIA A POPULAR REDIRECT PLUGIN

The 301 redirect plugin is a popular, verified tool that’s legitimately used in
most cases. However, I decided to take a closer look inside to be sure. Inside
the 301 redirect plugin was the domain uad.uinfasbengkulu[.]ac[.]id. Initially,
I didn’t think this was the cause of the malicious redirect, until I remembered
that the domain extension, .id, is an Indonesian based extension. Not only was
the client’s site not based in Indonesia, redirects to Indonesian gambling sites
are a common tactic attackers use when exploiting vulnerable sites.

Sure enough, after loading the domain uad.uinfasbengkulu[.]ac[.]id through
https://urlscan.io, a sandbox testing site, it landed on surfatech-tis[.]com,
which was the domain our client’s website was redirecting to. The attackers
likely accessed the victim’s site through a vulnerability or compromised
WordPress admin account, then proceeded to insert the intermediary domain in the
redirect plugin after installing it.


MORAL OF THE STORY

To wrap up this case, we can conclude that not all malware relies on heavy
obfuscation. Threat actors are constantly evolving, and developing new waves of
infections. Some of these tactics include hiding malicious content in plain
sight, through a popular verified plugin as seen above. This means that even
seemingly harmless elements on a site can carry hidden risks. It is crucial that
WordPress site owners take every possible step to protect their sites and stay
vigilant against potential threats. Mitigation steps to better protect a
WordPress site can be found below.


MITIGATION STEPS

To mitigate risk, there are a number of steps you can take to protect your
website from serving malware to your clients:

 1. Keep your plugins, themes, and website software up-to-date: Always patch to
    the latest version to help mitigate risk known software vulnerabilities.
    Website visitors should be sure to keep their browser and operating system
    up to date as well.
 2. Enforce unique passwords for all of your accounts: That includes credentials
    for sFTP, database, cPanel, and WordPress admin users.
 3. Remove WordPress admin users no longer in use: That includes credentials for
    sFTP, database, cPanel, and admin users.
 4. Periodically check WordPress admin users in your dashboard: Ensure that you
    recognize all WordPress admin users in your dashboard and remove any that
    are unrecognizable.
 5. Review installed plugins: Check that all plugins are ones that have been
    installed by you or your developer.
 6. Regularly scan for backdoors and malware: That means scanning at the server
    and client level to identify any malicious injections, SEO spam, or
    backdoors that may be lurking on your site.
 7. Monitor your logs for indicators of compromise: Regularly check for unusual
    or suspicious behavior and consider using a file integrity monitoring system
    on your website.
 8. Get a web application firewall (WAF): Firewalls can help mitigate bad bots,
    prevent brute force attacks, and detect attacks in your environment, which
    are features the Sucuri firewall provides.

And if you believe your site has been compromised or injected with malicious
scripts, we can help! Reach out to our support team for assistance and we can
get the malware cleaned up for you.

KAYLEIGH MARTIN

Kayleigh Martin is a Security Analyst at Sucuri who joined the company in 2020.
Kayleigh's job is to clean infected websites and hunt for undetected malware.
She has a versatile technical background working with infected websites,
investigating server issues, and troubleshooting broken sites. When Kayleigh
isn't hunting for undetected malware, she might be spending time with her
family, exploring beaches, or cooking new cuisines.

RELATED TAGS

 * Malware,
 * Redirects,
 * WordPress Security

RELATED CATEGORIES

 * Website Malware Infections
 * WordPress Security

YOU MAY ALSO LIKE

 * Sucuri Labs
 * Website Malware Infections
 * Website Security


WEB SHELL DOWNLOADER – SIMPLE ATTEMPT TO AVOID DETECTION

 * Yuliyan Tsvetkov
 * December 29, 2016

When dealing with compromised scenarios, our team has to be very thorough to
remove all pieces of malware in the infected website. Most of the…
Read the Post
 * Sucuri Labs
 * Website Security
 * WordPress Security


SQL TRIGGERS IN WEBSITE BACKDOORS

 * Luke Leal
 * February 25, 2021

Over the past year, there’s been an increasing trend of WordPress malware using
SQL triggers to hide malicious SQL queries within hacked databases. These
queries…
Read the Post
 * Web Pros
 * Website Security
 * WordPress Security


WP-CLI: HOW TO CONNECT TO WORDPRESS VIA SSH

 * Rianna MacLeod
 * April 25, 2023

The WordPress admin dashboard, though intuitive and feature-rich, can be
time-consuming to explore. If you’re looking for a more direct approach to
website management, consider…
Read the Post
 * Ecommerce Security
 * Website Malware Infections
 * WordPress Security


MAGECART WORDPRESS PLUGIN INJECTS MALICIOUS USER & CREDIT CARD SKIMMER

 * Ben Martin
 * December 21, 2023

One of our analysts recently found an interesting malicious plugin injected into
a WordPress / WooCommerce ecommerce website which both creates and conceals a
bogus…
Read the Post
 * Ecommerce Security
 * Website Malware Infections
 * WordPress Security


WOO SKIMMER USES STYLE TAGS AND IMAGE EXTENSION TO STEAL CARD DETAILS

 * Ben Martin
 * September 12, 2024

This post starts the same way many others do on this blog, and it will be
familiar to those who keep up with website security:…
Read the Post
 * Security Advisory
 * Security Education
 * WordPress Security


WORDPRESS VULNERABILITY & PATCH ROUNDUP AUGUST 2024

 * Sucuri Malware Research Team
 * August 30, 2024

Vulnerability reports and responsible disclosures are essential for website
security awareness and education. Automated attacks targeting known software
vulnerabilities are one of the leading causes…
Read the Post
 * Security Education
 * Web Pros
 * Website Security
 * WordPress Security


7 TIPS FOR PROTECTING YOUR WEBSITE

 * Art Martori
 * March 2, 2020

For many people, website security is an intimidating topic. It seems like
there’s an endless list of things necessary for protecting your website. And
while…
Read the Post
 * Security Education
 * Website Malware Infections
 * Website Security


2023 HACKED WEBSITE & MALWARE THREAT REPORT

 * Rianna MacLeod
 * June 12, 2024

Education is essential for defending your website against emerging threats.
That’s why we are thrilled to share our 2023 Hacked Website & Malware Threat
Report.…
Read the Post
 * Website Malware Infections
 * WordPress Security


CLOUDFLARE[.]SOLUTIONS KEYLOGGER ON THOUSANDS OF INFECTED WORDPRESS SITES

 * Denis Sinegubko
 * December 6, 2017

Update Dec. 8 2017: The cloudflare[.]solutions domain has now been taken down. A
few weeks ago, we wrote about a massive WordPress infection that injected an…
Read the Post
 * Security Education
 * Website Malware Infections
 * Website Security
 * WordPress Security


WORDPRESS CONTINUES TO FALL VICTIM TO CARDING ATTACKS

 * Ben Martin
 * April 14, 2021

Unsurprisingly, as WordPress continues to increase in popularity as
an e-commerce platform, attackers continue to attempt to steal credit card
information from unsuspecting clients. Currently, the WordPress
plugin WooCommerce accounts for roughly a quarter of all…
Read the Post

SEARCH

Search for:
Search






Let’s Connect


Products
Website Firewall Website Security Platform WordPress Security Website Backups
Hack Assistance Pricing
Solutions
DDoS Protection Malware Detection Malware Removal Malware Prevention Blacklist
Removal SEO Spam Removal
USE CASES
Developers Ecommerce Agency Plans Enterprise Services HTTPS/2 Virtual Patching
Support
Knowledge Base SiteCheck Guides Research Labs Report Abuse Status Report
Company
About Sucuri Contact Blog Referral Partners Testimonials
Terms of Use Privacy Policy Do Not Sell My Personal Information Frequently Asked
Questions

© 2024 GoDaddy Mediatemple, Inc., d/b/a Sucuri. All rights reserved.



back to top

X

Sucuri Cookie Policy
See our policy>>

Our website uses cookies, which help us to improve our site and enables us to
deliver the best possible service and customer experience.

Accept Decline Manage Options