Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Hack of Plug-in Website Ruffles WordPress Community

An intruder thought to be a former employee used a backdoor into the WPML website to skim email addresses and send a mass email blast.

When the website of a very popular plug-in used in an amazingly popular Web content management system (CMS) is hacked, this makes for big security news — even if, according to the plug-in's publisher, there's nothing to worry about.

WordPress is used as the content platform for around 75,000,000 websites. According to some observers, WordPress is used more than all the other CMS platforms combined, and it's the platform behind roughly one-third of all the content on the Internet. So when an email message was sent to the users of popular WordPress plug-in WPML (which stands for WordPress Multi-Language) telling them that major security holes had been found in the plug-in, the collective blood pressure of WordPress users went up a notch. 

The thing is, no such security holes had been found in the plug-in that is used by publishers who present versions of their site in multiple languages. Instead, an intruder thought to be a former employee used a backdoor into the WPML website to skim email addresses and send a mass email blast to the entire list from WPML.org's own servers.

In a blog post at WPML.org, CEO Amir Helzer detailed the steps the organization had taken to remediate the damage: "We updated wpml.org, rebuilt everything and reinstalled everything. We secured access to the admin use 2-factor authentication and minimized the access that the web server has to the file system."

While the organization stressed that no payment information had been compromised, it noted that login credentials for customer accounts had been taken. The group has sent legitimate follow-up email message to all users and is requiring them to reset their password on their next login.

In a statement provided to Dark Reading, Bill Evans, vice president of marketing for One Identity described a likely contributor to the hack. "In the case of this developer, they likely had access to a privileged account password, a database password, or an administrator password that was shared by many employees for the purpose of doing maintenance on critical systems." Helzer confirmed much of this in his blog post when he wrote, "Our data shows that the hacker used inside information (an old SSH password) and a hole that he left for himself while he was our employee."

In his extended statement, Evans stressed the importance of good privileged access management practices to eliminate the possibility of old and outdated passwords stored in code or DevOps config files.

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16772
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
CVE-2019-9464
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
CVE-2019-2220
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
CVE-2019-2221
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
CVE-2019-2222
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...