WordPress is the most popular content management system which is based on PHP and MySQL. A recent study revealed that WordPress-associated vulnerabilities have seen a 30% increase in 2018 when compared to the previous year. The number of vulnerabilities related to WordPress recorded in 2018 was 542.
Moreover, most of these vulnerabilities, almost 98% were related to WordPress plugins and only 2% of the vulnerabilities were found in the WordPress code. A vulnerability in WordPress plugin could allow attackers to access thousands of sites. The plugin architecture is the major reason people choose WordPress, however, out-of-date plugins are an excellent bait for attackers to compromise WordPress sites.
In this blog, we will be highlighting some of the massive attacks that involved compromise of WordPress sites.
#1. Over 1.5 million WordPress sites were hacked due to a critical vulnerability
A critical vulnerability was detected in the WordPress version 4.7.2. The developers of CMS reported the zero-day vulnerability in WordPress and patched three vulnerabilities including SQL injection, cross-site scripting, and access control bug.
However, one week later, the CMS developers reported that WordPress account had been hacked as the vulnerability was not patched in many sites. This allowed attackers to exploit the vulnerability and modify the content of any page or post on a targeted site.
The vulnerability was exploited to carry out four different defacement campaigns.
Apart from defacement campaigns, researchers also spotted SEO spam campaigns leveraging this WordPress vulnerability. Overall, researchers revealed that 1.5 million WordPress sites were hacked.
#2. WordPress plugin used to hack more than 200,000 websites
A WordPress Plugin named ‘Display Widgets’ has been used to install a backdoor on WordPress sites. The WordPress team removed the ‘Display Widgets’ plugin from the Official WordPress Plugins repository. However, the plugin was installed on more than 200,000 sites.
The plugin has been removed from Official WordPress Plugins repository four times.
#3. Brute-force attack targets over 190,000 WordPress sites/hour
In December 2017, a massive brute-force attack campaign targeted WordPress sites with Monero miners. The attackers brute-forced WordPress admin account logins to install a Monero miner on compromised sites. The WordPress security firm Wordfence stated that this was the biggest brute-force attack the company was forced to mitigate since its birth in 2012.
The brute-force attacks peaked at 14.1 million requests per hour. Brute-force requests originated from over 10,000 unique IP addresses and targeted around 190,000 WordPress sites per hour. In this Brute-force campaign, the attackers earned over $100,000 worth of Monero.
#4. United Nation WordPress site exposed over thousands of resumes online
The United Nations WordPress website that contained resumes of job applicants since 2012 was breached compromising thousands of resumes. The breach was caused by two vulnerabilities that were discovered in one of the UN’s WordPress websites. The two vulnerabilities included a path disclosure vulnerability and an information disclosure vulnerability. These vulnerabilities could have allowed attackers to gain access to the directory index that documented the job applications by conducting Man-in-the-Middle (MITM) attacks.
Publisher