{"id":6443,"date":"2023-01-03T22:59:47","date_gmt":"2023-01-03T22:59:47","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6443"},"modified":"2023-03-27T08:26:57","modified_gmt":"2023-03-27T08:26:57","slug":"a-new-linux-trojan-is-targeting-wordpress-sites","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/","title":{"rendered":"A New Linux Trojan Is Targeting WordPress Sites"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][split_line_heading animation_type=&#8221;line-reveal-by-space&#8221; font_style=&#8221;h3&#8243; line_reveal_by_space_text_effect=&#8221;default&#8221; content_alignment=&#8221;default&#8221; mobile_content_alignment=&#8221;inherit&#8221; link_target=&#8221;_self&#8221; text_content=&#8221;According to the researchers that uncovered the backdoor Linux virus, it has likely been in circulation for more than three years and exploits thirty or more plug-in vulnerabilities.&#8221;][\/split_line_heading][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">A recently discovered Trojan backdoor malware compromises WordPress-based websites by taking advantage of vulnerabilities in 30 separate plugins and themes. It only just to take advantage of one of these vulnerabilities to launch an attack.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span lang=\"en-AE\">Researchers from Doctor Web who discovered two iterations of the malware \u2014 dubbed <\/span><a href=\"https:\/\/vms.drweb.com\/virus\/?i=25604695\"><span lang=\"en-US\">Linux.BackDoor.WordPressExploit.1<\/span><\/a><span lang=\"en-AE\"> and <\/span><a href=\"https:\/\/vms.drweb.com\/virus\/?i=25604745\"><span lang=\"en-US\">Linux.BackDoor.WordPressExploit.2<\/span><\/a><span lang=\"en-AE\"> \u2014 said sites running outdated or unpatched versions of these WordPress tools are at risk of harboring malicious JavaScripts that redirect site visitors to nefarious websites, and should update those programs ASAP.<\/span><\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Malware that targets 32-bit versions of Linux and can also run on 64-bit versions of the platform has been around for a while, but here&#8217;s the scary part: &#8220;An analysis of an uncovered trojan application, performed by Doctor Web&#8217;s specialists, revealed that it could be the malicious tool that cybercriminals have been using for more than three years to carry out such attacks and monetize the resale of traffic, or arbitrage,&#8221; <a href=\"https:\/\/news.drweb.com\/show\/?i=14646&amp;lng=en&amp;c=23\">the researchers wrote.<\/a><\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">The Trojan&#8217;s version 1 exploits a number of plugins and themes, including WP Live Chat Support, Yellow Pencil Visual Theme Customizer, Easysmtp, WP GDPR Compliance, Google Code Inserter, and the Blog Designer WordPress plugin. In addition to Brizy, FV Flowplayer, and WordPress Coming Soon, version 2 also makes use of Poll, Survey, Form, &amp; Quiz Maker by OpinionStage and Social Metrics Tracker.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Cybercriminals frequently use WordPress add-ons and themes as a means to compromise websites and use them for malicious purposes such as phishing, ad fraud, and malware distribution. Flaws in security are very widespread. For instance, in December, an SSRF vulnerability was discovered in the Google Web Stories plugin, which might allow an attacker to steal metadata from WordPress sites hosted on an AWS server and possibly log in to a cloud instance to perform commands.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6449,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,6],"tags":[57,52],"class_list":{"0":"post-6443","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-malware","8":"category-vulnerability-assessment","9":"tag-malware","10":"tag-vulnerabilities"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A New Linux Trojan Is Targeting WordPress Sites - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"A recently discovered Trojan backdoor malware compromises WordPress-based websites by taking advantage of vulnerabilities in 30 separate plugins and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A New Linux Trojan Is Targeting WordPress Sites - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"A recently discovered Trojan backdoor malware compromises WordPress-based websites by taking advantage of vulnerabilities in 30 separate plugins and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-03T22:59:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:26:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"A New Linux Trojan Is Targeting WordPress Sites\",\"datePublished\":\"2023-01-03T22:59:47+00:00\",\"dateModified\":\"2023-03-27T08:26:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/\"},\"wordCount\":660,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg\",\"keywords\":[\"Malware\",\"Vulnerabilities\"],\"articleSection\":[\"Malware\",\"Vulnerability\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/\",\"name\":\"A New Linux Trojan Is Targeting WordPress Sites - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg\",\"datePublished\":\"2023-01-03T22:59:47+00:00\",\"dateModified\":\"2023-03-27T08:26:57+00:00\",\"description\":\"A recently discovered Trojan backdoor malware compromises WordPress-based websites by taking advantage of vulnerabilities in 30 separate plugins and\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg\",\"width\":1500,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/a-new-linux-trojan-is-targeting-wordpress-sites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A New Linux Trojan Is Targeting WordPress Sites\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A New Linux Trojan Is Targeting WordPress Sites - Sajin Shivdas | Cybersecurity","description":"A recently discovered Trojan backdoor malware compromises WordPress-based websites by taking advantage of vulnerabilities in 30 separate plugins and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/","og_locale":"en_US","og_type":"article","og_title":"A New Linux Trojan Is Targeting WordPress Sites - Sajin Shivdas | Cybersecurity","og_description":"A recently discovered Trojan backdoor malware compromises WordPress-based websites by taking advantage of vulnerabilities in 30 separate plugins and","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-01-03T22:59:47+00:00","article_modified_time":"2023-03-27T08:26:57+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"A New Linux Trojan Is Targeting WordPress Sites","datePublished":"2023-01-03T22:59:47+00:00","dateModified":"2023-03-27T08:26:57+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/"},"wordCount":660,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg","keywords":["Malware","Vulnerabilities"],"articleSection":["Malware","Vulnerability"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/","name":"A New Linux Trojan Is Targeting WordPress Sites - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg","datePublished":"2023-01-03T22:59:47+00:00","dateModified":"2023-03-27T08:26:57+00:00","description":"A recently discovered Trojan backdoor malware compromises WordPress-based websites by taking advantage of vulnerabilities in 30 separate plugins and","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/desktop-is-potted-plant-stationery-open-laptop-with-text-wordpress-plugin-screen-home-office.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/a-new-linux-trojan-is-targeting-wordpress-sites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"A New Linux Trojan Is Targeting WordPress Sites"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6443"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6449"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}