You may remember that a few months ago we passed along the first quarterly report on hacked websites. Based on the data gathered last quarter and the insights from the community on the first report, the Sucuri Remediation Group now releases the second report. Based on what’s been happening to the UGNN site, this report is dead on.
This report is based on data collected and analyzed by the Sucuri Remediation Group (RG), which includes the Incident Response Team (IRT) and the Malware Research Team (MRT). It analyzes over 9k infected websites and shares statistics associated with:
- Affected open-source CMS applications
- Details on the WordPress platform
- Blacklists flagging the hacked site
- Malware families and their effects
Sucuri analysis shows that SEO spam continues to be a go-to for attackers, with a 6% increase over Q1. In total, 38% of sites had some form of SEO spam injection. Backdoors continue to be one of the many post-hack actions attackers take, with 71% of the infected sites having some form of backdoor injection.
This report will provide trends based on the CMS applications most affected by website compromises and the type of malware families being employed by the attackers. Additionally included new data points around the number of websites blacklisted during the remediation phase and additional details into the makeup of the WordPress platforms.
View and download the report : Sucuri-Hacked-Website-Report-2016Q2.pdf