Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:40 PM
Connect Directly

Attacks on WordPress Sites Surge

Defiant says it observed a 30-fold increase in attacks in just the past few days.

Security teams that already have their hands full dealing with COVID-19-related threats now have another issue to contend with.

Attacks on WordPress sites have soared in recent days to more than 30 times the normal volume. This week researchers from WordPress firewall provider Defiant reported observing attack attempts on more than 900,000 websites since April 28.

On May 3 alone, Defiant counted in excess of 20 million attacks against some 500,000 WordPress sites. Over the course of the past month, Defiant says it detected more than 24,000 distinct IP addresses being used to launch attacks on WordPress.

According to Defiant, a single threat actor appears to be behind a majority of the attacks, many of which have targeted known cross-site scripting (XSS) vulnerabilities in third-party WordPress plug-ins. The same adversary is also targeting other, older vulnerabilities in WordPress to attack sites, the vendor said in a report this week.

The attacks involving the XSS vulnerabilities are focused primarily on planting a backdoor on the victim site, says Ram Gall, a software quality assurance engineer at Defiant.

The backdoor's payload is designed to add a malicious JavaScript to every page on the site. This would redirect any visitors to sites hosting malicious advertisements.

If a victim is logged into WordPress as an administrator, the script attempts to inject a malicious PHP backdoor into the site, Defiant said. The backdoor then downloads another payload that would ultimately give the attacker control over the domain. The access would allow the threat actor to do things like embed a Web shell, create a malicious administrator account, or delete the content of the site.

"For the non-XSS attacks we saw, the attacker attempted to redirect visitors to the same malvertising campaign by changing the site's home URL," Gall notes.

The sheer volume and variety of the attacks — and the fact they involve older vulnerabilities — suggest the attacks are not targeted. "This campaign was not aimed at any specific category of sites," Gall says. "Ultimately, with any campaign like this the motivation is monetization," he says.

Many of the vulnerabilities the threat actor has targeted have been exploited in previous campaigns as well, Defiant said. According to the vendor, more than half of the attacks involved a plug-in called Easy2Map that was removed from WordPress' repository last August because of security issues. Other vulnerabilities that have been heavily targeted in the campaign include an XSS vulnerability in a plug-in named Blog Designer, another in a WP GDPR Compliance plug-in, and one in a now-pulled plug-in named Total Donations.

"Although it is not readily apparent why these vulnerabilities were targeted, this is a large-scale campaign that could easily pivot to other targets," Defiant warns in its alert.

Third-Party Plug-in Risks
The large-scale attacks are another reminder of the risks WordPress operators run in using third-party plug-ins on their sites. Over the years, tens of thousands of plug-ins have become available for WordPress that allow owners and operators to extend site functionality. But vulnerabilities in these plug-ins — and the fact that many sites often use old and out-of-date plug-ins — have made them hugely popular targets for attackers.

Ameet Naik, security evangelist at PerimeterX, says vulnerable WordPress plug-ins represent a critical third-party risk. "Over 70% of the scripts on a website are third-party, which represents a significant risk for any website owner," he says.

In addition to making security an integral part of the development cycle, website owners can also follow a few simple steps to mitigate third-party plug-in risks. These includes scanning the site for known vulnerable libraries, using content security policies to restrict access, using Web application firewalls to mitigate XSS attacks, and using client-side runtime visibility tools for detecting malicious script activity, Naik says.

For organizations, such attacks demonstrate the need for a layered security approach, Gall says.

"Keep WordPress core, plug-ins, and themes up to date," he notes. "Deactivate and delete any plug-ins or themes that have been removed from the WordPress repository."

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
IoT Vulnerability Disclosure Platform Launched
Dark Reading Staff 10/19/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-22
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not pa...
PUBLISHED: 2020-10-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
PUBLISHED: 2020-10-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
PUBLISHED: 2020-10-22
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
PUBLISHED: 2020-10-22
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.