Tag Archives: hacked

WordPress GDPR Compliance Plugin Hacked

IRONY: /’irænē/ Noun. A state of affairs or an event that seems deliberately contrary to what one expects and is often amusing* as a result.

The European Union passed laws earlier in 2017 and 2018 to help protect consumers’ personal data online. The EU General Protection Data Regulation (GDPR) is supposed to make companies gather consent to use people’s information and protecting it from scammers and identity thieves.

WP GDPR compliance plugin

WordPress offered a GDPR plugin to allow website owners to add a checkbox to their sites. This allowed users of the website to give permission to the website owners to use their data for a defined purpose. Website users were given the opportunity to request copies of the information that the website had gathered about them.

Where the Problem Started

Through the use of an admin-ajax.php file, the users’ browsers connect with the WordPress server. Ajax is a combination of JavaScript and XML technology which creates user-friendly interfaces. The Ajax system has been around for a while in WordPress and allows the Content Management System (CMS) to perform auto-saving functions more efficiently along with better revision tracking and other benefits.

The GDPR plugin can allow users to configure it through the admin-ajax.php file, which is where the hackers found a chink in the armor, so to speak. Identity thieves can use the file to send bad commands, which the plugin stores and executes, allowing the attackers to use WordPress for their own malicious ends.

How Attackers Exploit the Plugin

According to Wordfence, the WordPress security firm, the attackers are using the plugin in two ways.

  1. website hackedAttackers create administrative accounts by allowing new users to register. They use these accounts, altering a setting to automatically make them administrators. Once they are an administrator, they install a plugin that infects the site with malware. The hackers installed a PHP web shell, giving them remote admin capabilities on the web server. This provides them with terminal access and a file manager.
  2. The hackers upload scripted tasks that are scheduled via WP-Cron. The Cron is a task scheduling program commonly used in Unix systems and how WordPress handles scheduled activities. This attack uses the e-commerce plugin WooCommerce, a plugin that WP GDPR Compliance supports. The attackers hijacked a function of WooCommerce to install an additional plugin called 2MB Autocode. This hack would allow administrators to put their own PHP code into WordPress posts. The hackers would use this code to download code from yet another site. Once this was completed, the 2MB Autocode would delete itself, making it difficult to trace the problem.

In regards to the second attack, Wordfence couldn’t find any signs of malicious code in connection to the hack, but warn that the hackers may be lying in wait for things to cool down before they made their next move. According to Wordfence’s warning: “It’s possible that these attackers are stockpiling infected hosts to be packaged and sold wholesale to another actor who has their own intentions. There’s also the chance that these attackers do have their own goals in mind, but haven’t launched that phase of the attack yet.”

Flaw Has Been Fixed

The developers of the WP GDPR Compliance plugin have fixed the flaw and the plugin has been restored to the WordPress directory. Unfortunately, it wasn’t caught in time for a lot of website owners who are now cleaning up hacked sites and trying to rid their sites of the malicious code.

If you suspect that your site has been hacked or corrupted by a hacker, contact the experts at WTI to help you get your site healthy and back online.

*No one involved with cleaning up the WP GDPR Compliance exploitation found this amusing.

The Facts About Website Security in 2017

website security info from 2017If you’ve ever dealt with a website hack, you know what a hassle it can be. Whether your website goes down or displays incorrect or inappropriate content, every hack is a serious headache. In May of 2018, Sucuri, one leading company when it comes to website security information, released a study with data from 2017. See the highlights below and learn what you can do to prevent hacks.

CMS Security Stats

In 2017, the three website CMS platforms most commonly infected by a hack were WordPress, Joomla!, and Magneto. Despite WordPress being known as the most popular and one of the most secure CMS platforms, especially for SEO purposes, it is also the most hacked. It is important to note, however, that most of these hacks were not due to the CMS application itself The hacks were more often the result of improper practices by webmasters, or weaknesses in extra components like plugins, extensions, and modules (Sucuri).

2017 also saw a decrease in outdated CMS platforms at the point of infection. Here is a breakdown of the number of infected sites Sucuri studied that were outdated as well as a comparison to outdated and infected sites in 2016 (Sucuri):

  • WordPress: 39.3% of infected websites studied were outdated, which is a 21% decrease from Q3 of 2016’s 61% of infected and outdated WordPress sites.
  • Joomla!: 69.8% of infected websites studied were outdated, a 15% drop from 2016.
  • Drupal: 65.3% of infected websites studied were outdated, a 15% drop from 2016.
  • Magneto: 80.3% of infected websites studied were outdated, the largest number, but still a 13% decrease since Q3 of 2016.

The key takeaway here is that even with a secure CMS, it is important to have a knowledgeable web team that can provide backup security measures.

Blacklisted Websites

When a prominent blacklist authority like Google flags a hacked website, it means that the site has been blacklisted. Blacklisting can affect Search Engine rankings as well as mediums for communication, such as email using the site domain.

In 2017, 17% of infected websites Sucuri observed were blacklisted. This is a 2% increase from Q3 of 2016. Norton and McAfee accounted for 45% of blacklisted sites, while Google Sae Browsing accounted for only 12.9% of blacklisted sites (Sucuri).

Malware

In their 2017 study, Sucuri also analyzed the different trends in Malware. See the most common malware families in 2017, along with descriptions of key families:

  • Backdoor: a method/file used to bypass typical authentication to reinfect and retain remote site access.
  • Malware: The generic term to describe browser-side code used cause damage to a computer, server, or network, often by drive-by downloads.
  • Spam-SEO: Any compromise that targets a website’s search engine optimization (SEO).
  • Other: Other popular malware families in 2017 include Mailer, Hacktool, Dropper, Defaced, and Phishing.

2017 web security chart: malware family distribution: backdoor = 71%, malware = 47%, SEO spam = 44%, other = 51.8%

Some other interesting trends in 2017 was an increase in spam SEO, and an 82% increase in the number of files cleaned from the last report in Q3 of 2016. The rise in spam SEO shows that hackers are now finding it more worthwhile to use SEO spam than malware. The increase in filed cleaned indicates a greater depth of files being affected in hacks, meaning that merely clearing one file of symptoms will likely not fix a hack entirely. The top three modified filed in hacks studied were the index.php (28$), the .htaccess (10%), and the functions.php (9%) (Sucuri).

What Can You Do? – Protect Your Site.

The bottom line here is that hackers are smart and getting smarter every day. It’s more important now than ever to make sure your website is protected.

Making smart choices to ensure your website is secure is the best way to combat the rise in hacking. Get an SSL, choose a CMS that is secure, keep your CMS updated, look into website backup systems, and purchase a security package to protect your site as well as information belonging to you and your customers.

If you are interested in learning more about the security packages that we offer for websites, give WTI a call today at 309-489-0026 or contact brandy@websitestoimpress.com.

Reference: Sucuri, 2018: https://sucuri.net/reports/2017-hacked-website-report