On Thursday, Sucuri detected thousands of compromised sites, 95 percent of which are running on WordPress. Company researchers have not yet determined how the sites are being hacked, but they suspect it involves vulnerabilities in WordPress plugins. Already, 17 percent of the hacked sites have been blacklisted by a Google service that warns users before they visit booby-trapped properties. Interestingly, Cid added, the attackers have managed to compromise security provider Coverity and are using it as part of the malicious redirection mechanism. The image above shows the sequence of events as viewed from the network level using a debugging tool.
Sucuri has dubbed the campaign "VisitorTracker," because one of the function names used in a malicious javascript file is visitorTracker_isMob(). Cid didn't identify any of the compromised sites. Administrators can use this
Sucuri scanning tool to check if their site is affected by this ongoing campaign.