Skip to main content

WordPress plugins hacked for fake admin accounts

WordPress on a laptop
(Image credit: Shutterstock)

Popular web hosting site WordPress has come under attack from hackers exploiting a flaw tgat allows them to creat rogue admin accounts.

Researchers at security firm Wordfence discovered that known vulnerabilities in WordPress plugins have been exploited by injecting malicious JavaScript into the frontends of victim sites which leads visitors to these compromised sites to be redirected to potentially harmful content including malware droppers and fraudulent sites. Many of the playloads are obfuscated by the attackers in an attempt to avoid detection by WAF and IDS software.

Wordfence researchers discovered where the attacks are originating from and they have identified various IP addresses linked to web hosting providers. However, once the issue was brought to the attention of the providers, most of the IPs ceased their illegal activity except for one.

In a blog post explaining its discovery, Wordfence's Mikey Veenstra explained that most of the attacks stemmed from one IP address, saying:

“The IP address in question is 104.130.139.134, a Rackspace server currently hosting some presumably compromised websites. We have reached out to Rackspace to inform them of this activity, in hopes that they will take action in preventing further attacks from their network. We have not yet heard back.”

WordPress plugin vulnerabilities

All of the attacks that have occurred so far have targeted several known vulnerabilities from former NicDark plugins including nd-booking, nd-travel and nd-learning.

While the initial research into the campaign identified the injection of scripts which triggered malicious redirects or unwanted popups in the browsers of those who visited a victim site, the campaign has evolved by adding an additional script which attempts to install a backdoor into the target site by exploiting an administrator's session.

Wordfence also explained how WordPress site owners can avoid falling victim to this campaign saying:

“As always, updating the plugins and themes on your WordPress site is an excellent layer of defense against campaigns like these. Check your site for needed updates frequently to ensure you’re receiving the latest patches as they’re released. Wordfence users periodically receive emails informing them when updates are available as well.”

Via SC Magazine