IonCube Malware Infects WordPress and Joomla Websites

Recently, more than 700 WordPress and Joomla websites were found to be infected with IonCube Malware. A total of more than 7000 files were infected. These websites were infected with legitimate IonCube encoded files. Key directories of a WordPress site, such as “wrgcduzk.php” and “diff98.php”,  were infected by this malware.

In brief, IonCube is actually a  PHP Encoder employed for encrypting and protecting files with PHP encoding, obfuscation, encryption and licensing capabilities. Hackers are known to use the  IonCube Malware for creating a backdoor on vulnerable websites permitting them to steal data from the Victims.

Researchers must have gone around using terms like “Joomla hacked” and “WordPress hacked” as part of their effort to decipher this hacking incident. At the initial stage, the researchers were able to detect IonCube Malware WordPress site files that encoded with IonCube, considered to be one of the oldest and extremely difficult for reversing  PHP obfuscation technologies. Additional analysis disclosed the fact that this malware infected CodeIgniter and Joomla files and is thus visible on almost all web servers running PHP. According to  SiteLock, it was discovered that the files failed to constantly follow malicious naming patterns, referring to the fact that harmless files with names like “menu.php” and “inc.php” also contained this malware.

The researchers also discovered the fake file to have a code block after the PHP closing tags, similar to the legitimate IonCube file. However, this code block, unlike the real file, comprises of only alphanumeric characters and newlines. What was further noticed is that each legitimate IonCube file reference to the domain was not present in the fake files.

Mitigation by SiteLock

If ionCube-encoded files have not been intentionally or specifically installed by you or your developer, then any file claiming to use ionCube is likely to be suspicious since the effective usage of IonCube generally needs manual server configuration. Moreover,  cross-compatibility with varied versions of PHP is found to be minimal, thus decreasing the viability of use as malware.

Get Protected with cWatch Now!

Notify of
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x