JavaScript Malware Switches to Server-Side Redirects & DNS TXT Records as TDS

JavaScript Malware Switches to Server-Side Redirects & DNS TXT Records as TDS

Last August we documented a malware campaign that was injecting malicious JavaScript code into compromised WordPress sites to redirect site visitors to VexTrio domains. The most interesting thing about that malware was how it used dynamic DNS TXT records of the tracker-cloud[.]com domain to obtain redirect URLs.

We’ve been tracking this campaign ever since — and we’ve recorded multiple changes in obfuscation techniques and domain names used in their DNS TXT traffic direction system (TDS).

Continue reading JavaScript Malware Switches to Server-Side Redirects & DNS TXT Records as TDS at Sucuri Blog.

Read more: JavaScript Malware Switches to Server-Side Redirects & DNS TXT Records as TDS

Story added 18. April 2024, content source with full text you can find at link above.