Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Joomla SEO Spam Injector: Obfuscated PHP Backdoor Hijacking Site Visitors

0
Medium
Published: Fri Apr 17 2026 (04/17/2026, 08:35:52 UTC)
Source: AlienVault OTX General

Description

A compromised Joomla website displayed suspicious product links unrelated to the business. Investigation revealed heavily obfuscated PHP code injected at the top of index.php that contacted external command-and-control servers to receive instructions and manipulate content. The malware acts as a remote loader, assembling strings from two-character chunks to evade signature-based detection. It contacts primary C2 cdn.erpsaz.com and fallback cdn.saholerp.com, sending server fingerprint data and receiving dynamic instructions. Based on responses, it redirects visitors, injects spam content, or serves fake SEO pages to search engines. This approach allows attackers to control compromised sites remotely without modifying local files again, enabling dynamic spam injection, visitor redirection, and search engine manipulation while remaining undetected for extended periods.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/17/2026, 10:47:06 UTC

Technical Analysis

A compromised Joomla website was found to contain heavily obfuscated PHP code injected at the top of the index.php file. This code functions as a remote loader backdoor that contacts command-and-control servers (cdn.erpsaz.com and cdn.saholerp.com) to send server fingerprint data and receive dynamic instructions. Based on these instructions, the malware can redirect visitors, inject spam content, or serve fake SEO pages to search engines, facilitating search engine manipulation and spam campaigns. The malware assembles strings from two-character chunks to evade signature-based detection and maintains persistent remote control without further local file modifications. This campaign is identified as a medium-severity threat with no known exploits in the wild and no vendor-provided patch or remediation.

Potential Impact

The malware enables attackers to hijack visitors to compromised Joomla sites by redirecting them or injecting spam content, potentially damaging the site's reputation and search engine rankings. It also manipulates search engine indexing by serving fake SEO pages, which can degrade the site's visibility and trustworthiness. The obfuscation and remote control capabilities allow the malware to remain undetected for extended periods, complicating detection and cleanup efforts.

Mitigation Recommendations

No official patch or remediation guidance is provided in the available data. Site owners should conduct thorough forensic analysis to identify and remove the injected obfuscated PHP code from index.php and other affected files. Monitoring for suspicious outbound connections to the identified C2 domains (cdn.erpsaz.com, cdn.saholerp.com) and blocking these at the network perimeter may help mitigate ongoing control. Regular integrity checks of Joomla core files and installed extensions, combined with timely application of Joomla security updates, are recommended to prevent reinfection. Patch status is not yet confirmed—check vendor advisories and security blogs for updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.sucuri.net/2026/04/joomla-seo-spam-injector-obfuscated-php-backdoor-hijacking-site-visitors.html"]
Adversary
null
Pulse Id
69e1f0e855758d808bea9915
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://cdn.erpsaz.com/admin.php

Domain

ValueDescriptionCopy
domainlashowroom.com
domaincdn.erpsaz.com
domaincdn.saholerp.com

Threat ID: 69e20c1982d89c981fc722ee

Added to database: 4/17/2026, 10:31:53 AM

Last enriched: 4/17/2026, 10:47:06 AM

Last updated: 4/17/2026, 5:40:53 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses