Thousands of hacked WordPress sites redirect visitors to scam sites.

Thousands of WordPress websites have fallen victim to a hack targeting the tagDiv plugin. Hackers have injected the Balada Injector into this plugin. According to data from Envato Markets, approximately 155,000 WordPress websites are utilizing the compromised plugin. This plugin is essential for accessing two WordPress themes: Newspaper and Newsmag. It is important to note that version 4.2 of the plugin is secure.

The vulnerability exploited by the hackers allows them unauthorized access to affected websites, potentially leading to various malicious activities. Website owners and administrators must take immediate action to ensure the security and integrity of their WordPress installations.

The tagDiv plugin, developed by the tagDiv team, provides users with essential features and functionalities for creating and managing content on their WordPress websites. However, cybercriminals have seized this opportunity to compromise the plugin and exploit its widespread usage among WordPress users.

The hackers successfully inserted the Balada Injector into the tagDiv plugin, enabling them to execute unauthorized code and gain control over the affected websites. This malicious code can be utilized to perform a range of harmful actions, such as injecting malicious scripts, redirecting users to phishing websites, or stealing sensitive user information.

Envato Markets, a popular marketplace for digital assets, estimates that over 155,000 WordPress websites are currently utilizing the compromised tagDiv plugin. This significant number highlights the potential impact of the hack and underscores the urgency for website owners to address the issue promptly.

Website administrators should prioritize updating their tagDiv plugin to the latest secure version, which is currently version 4.2. By doing so, they will effectively patch the vulnerability and mitigate the risk of unauthorized access to their websites. Additionally, it is crucial to conduct a thorough security audit to identify any unauthorized modifications or suspicious activities within the WordPress installation.

Furthermore, website owners should consider implementing additional security measures to fortify their WordPress websites against future attacks. These measures may include implementing a web application firewall, utilizing strong and unique passwords for all user accounts, regularly backing up website data, and staying vigilant for any suspicious network traffic or unusual behavior.

The tagDiv team has been made aware of the issue and is actively investigating the hack. They are working diligently to release a secure update that addresses the vulnerability and ensures the safety of WordPress websites using their plugin. In the meantime, it is essential for website owners to remain proactive in safeguarding their websites and promptly implement any security updates or patches provided by the tagDiv team.

In conclusion, the recent hack targeting the tagDiv plugin has affected thousands of WordPress websites, potentially exposing them to unauthorized access and various malicious activities. Website owners must take immediate action by updating the plugin to its latest secure version, conducting security audits, and implementing additional security measures to protect their websites from further attacks. The tagDiv team is actively working towards resolving the issue and releasing a secure update. However, maintaining website security should be an ongoing priority for all WordPress users.

Isabella Walker

Isabella Walker