Demystifying the WP Live Chat Support WordPress Redirect Hack

WordPress malicious redirect to random sites advertising to download software

WordPress Redirect Hack

The recent WordPress JavaScript Redirect hack took everyone by surprise. The XSS JS injection caused the WP Live Chat Support plugin option to be injected with the following malicious code:

The Malicious Code

The Decoded Code

This in turn translates into:

Code Injecting Code

The injected script further executes a script from an external domain:

The end result is a malicious redirect to random sites advertising you to download software.

WP Live Chat Support plugin as of yesterday had over 60,000+ active installs as per the WordPress plugin repository and was disabled for newer installs.

As a result of this WordPress hack Google flagged many sites as malicious and also disabled Google Ads campaigns of many publishers.

The solution is not just to disable the rogue plugin but also to clean up the WordPress database infection. If you need assistance, you can consider our WordPress Malware Removal Service.

Fix WordPress Redirect Malware Now! Permanent Removal. Full Cleanup with report.

See Also:

This article is written by Evelyn Allison. Evelyn has over two decades of experience with the big-tech corporate giants. Starting in 2002 with consumer IT remote support, he transitioned into IT enterprise support and systems provisioning for Windows and Linux servers. Her prowess spans her expertise in network security, security audit and scripting-based-automation. Actively involved in web security since 2017, Evelyn has worked with various technologies to secure the web, leveraging tech like Nginx, modsecurity, reverse-proxies, developing web-application-firewalls, on-the-fly asset optimization using Google’s PageSpeed Module and more. Her expertise is reflected in the top-tier plugins and comprehensive consulting-services she offers in the domain of web-security.