Blog

SQL Trigger Backdoor in WordPress Comments Revealed
SQL Trigger Backdoor in WordPress Comments Revealed
SQL Trigger Backdoor in WordPress Comments Revealed
SQL Trigger Backdoor in WordPress Comments Revealed

SQL Trigger Backdoor in WordPress Comments Revealed

Throughout 2020 there has been an increasing trend of WordPress malware using SQL triggers to hide a malicious SQL query that will inject an admin level user into the infected database whenever the trigger condition is met. This is problematic for website owners that are cleaning an infected website as most online website cleaning guides

A WordPress Malware Which Disables Security Plugins

How it works The malware was found within the malicious file ./wp-includes/IXR/class-IXR-cache.php. It starts by assigning the website’s root directory to DIZIN to help obfuscate loading the core WordPress file wp-load.php: The use of require_once to load wp-load.php allows the attacker to use WordPress coding hooks and variables to cleanly disable the security plugins. First, the attacker defines the function findinSecurity which is used later

HDD/SSD/NVME passthrough on Proxmox VE PVE

1. Install lshw on PVE 1.1 Bring up terminal from PVE directly or via SSH or by using “Shell” from PVE web gui 1.2 Enter following command to install lshw 2. Check & note down details about physical disks we want to passthrough 2.1 Using following command We should use disk by their ID rather

Installing DSM(Xpenology) on Proxmox VE(PVE) for MS 365 Active Backups

Problem : My client’s organisation running on Microsoft 365 but they need to have a cost effective local backup system in place just to avoid any data loss on server outages. Solution Draft : After doing many hours of research, I found out that only Synology is offering a very straightforward yet stable backup solution

Let’s Talk About How Can Help You Securely Advance

Get A Free Quote
SQL Trigger Backdoor in WordPress Comments Revealed
SQL Trigger Backdoor in WordPress Comments Revealed