Fake WordPress site distributing backdoored release

Can you find five differences between these two sites? Wordpresz.
Written by Dancho Danchev, Contributor

Can you find five differences between these two sites? Wordpresz.org may indeed look like WordPress.org, but the 2.6.4 release it's distributing is on purposely backdoored in order to steal the content of cookies from those who have installed it, potentially leading to to hijacking of their WordPress blogging platforms for malicious purposes. Not only is the fake domain registered several days ago, but also, it's sharing IP ( with a fake online pharmacy - livepills.com.

A brief summary by Sophos of Craig Murphy's alert issued on Monday :

"Craig talks about how when he logged in to his admin account in WordPress he received a “High Risk Vulnerability Warning” from a spoofed WordPress domain. (The last ’s’ in WordPress.org has been replaced by a ‘z’.) The Warning suggests upgrading to the ‘new’ version 2.6.4 of WordPress. Downloading this ‘new’ version of WordPress I found that of the 638 files in version 2.6.4, 637 were identical to the same files in the official 2.6.3. The only difference was in the file pluggable.php. The hacked version of the file pluggable appears to be stealing the content of cookies on larger installations of WordPress. Sophos are now detecting this file as Troj/WPHack-A."

The backdoored pluggable.php file attempts to send the stolen data to wordpresz.org/tuk.php which is still accepting cookies if the requests are properly formatted. The spoof is a nearly perfect combination of social engineering, typosquatting and the natural EstDomains connection as the domain registrar, nearly perfect in the sense that they couldn't duplicate the whole WordPress.org potentially raising suspicion at the end user's end.

Editorial standards