Forum Moderators: phranque
Typically, the malware is injected into Web sites via known vulnerabilities in site plugins or third-party software — such as shopping cart programs.
It’s worth noting that the malware requires the compromised user account on the Linux system to be an administrator