PULSE NAME
Joomla SEO Spam Injector: Obfuscated PHP Backdoor Hijacking Site Visitors
WHITE AlienVault 2026-04-17 Modified: 2026-04-17
4
IOCs
LOW VOLUME
A compromised Joomla website displayed suspicious product links unrelated to the business. Investigation revealed heavily obfuscated PHP code injected at the top of index.php that contacted external command-and-control servers to receive instructions and manipulate content. The malware acts as a remote loader, assembling strings from two-character chunks to evade signature-based detection. It contacts primary C2 cdn.erpsaz.com and fallback cdn.saholerp.com, sending server fingerprint data and receiving dynamic instructions. Based on responses, it redirects visitors, injects spam content, or serves fake SEO pages to search engines. This approach allows attackers to control compromised sites remotely without modifying local files again, enabling dynamic spam injection, visitor redirection, and search engine manipulation while remaining undetected for extended periods.
Indicators of Compromise (4)
All URL domain hostname
TYPEINDICATORDESCRIPTIONCREATED
URL http://cdn.erpsaz.com/admin.php 2026-04-17
domain lashowroom.com 2026-04-17
hostname cdn.erpsaz.com 2026-04-17
hostname cdn.saholerp.com 2026-04-17