Case Study: SEO Injection & Malware Discovery

Client: E-commerce company, Colombia, 2025

Engagement type: Incident response + web application penetration test

Executive Summary

A production WordPress e-commerce site was silently compromised with a PHP-based SEO spam injection. Malicious code served gambling and illegal content exclusively to Google search crawlers — invisible to human visitors — exploiting the client's established domain authority to rank illegal content in Google Search results.

Findings

Methodology

Daniel Ordonez Arango identified the compromise by analyzing server logs, comparing raw HTTP responses with Googlebot User-Agent versus normal browsers, and performing a full WordPress file integrity check. The attack vector was traced to an outdated WooCommerce plugin with a known unauthenticated RCE vulnerability (CVSS 9.8).

Outcome

All malicious files identified and removed. Plugin ecosystem fully updated. File permission hardening applied. Client's domain authority was successfully restored in Google Search Console within 6 weeks of remediation. Full remediation report delivered with CVSS scores and prioritized action items.

← Back to portfolio