A threat actor is actively trying to insert a backdoor into and compromise WordPress-based sites to redirect visitors to malvertising.
“While our records show that this threat actor may have sent out a smaller volume of attacks in the past, it’s only in the past few days that they’ve truly ramped up, to the point where more than 20 million attacks were attempted against more than half a million individual sites on May 3, 2020,” Wordfence analysts discovered.
“Over the course of the past month in total, we’ve detected over 24,000 distinct IP addresses sending requests matching these attacks to over 900,000 sites.”
About the attacks
The group has an obvious predilection for older cross-site scripting (XSS) and options update vulnerabilities in less popular WordPress plugins and themes such as Easy2Map, Blog Designer, WP GDPR Compliance, Total Donations, and the Newspaper theme.
Most of these vulnerabilities have been patched months and years ago and are known to have been targeted in the past. Some of the targeted plugins have also been removed from online plugin repositories, including WordPress’ official one.
They expect the threat actor to take advantage of similar vulnerabilities in other plugins and themes.
What to do?
“The vast majority of these attacks are targeted at vulnerabilities that were patched months or years ago, and in plugins that don’t have a large number of users. While we did not see any attacks that would be effective against the latest versions of any currently available plugins, running a Web Application Firewall can also help protect your site against any vulnerabilities that might have not yet been patched,” Wordfence analysts noted.
K2 Cyber Security’s Timothy Chiu says that perimeter security tools like WAFs require a lot of tuning to make them effective at protecting applications and companies don’t typically have the security resources required to do an adequate job.
For organizations that have that problem and for individuals who only run a site or two the easiest thing to do to minimize their attack surface is to keep plugins and themes up to date and to delete plugins that they don’t need anymore and those that have been removed from the WordPress plugin repository.
Wordfence has provided indicators of compromise site administrators can use to check whether they’ve been hit.