Attacking WordPress users is always something since the userbase is huge. Thus, Wordfence, a web app firewall has reported that a new campaign of attacks is directed towards numerous WordPress sites, to steal configuration files that have site’s database credentials. This can later be used for several admin privileges like creating backdoors, making new admins, or even deleting the entire site! Users are advised to update their passwords immediately.

Same Old Actor From Past

Hackers Attacking WordPress Sites to Steal Database Credentials
Hackers Attacking WordPress Sites to Steal Database Credentials

Exploiting any WordPress related vulnerabilities can garner something big. And since the fact is widely accepted, a group that previously exploited XSS cross-scripting vulnerability in WordPress has no targeted old vulnerabilities in unpatched plug-ins, and download configuration files from sites.

This, in return, to steal the login credentials of the site’s database. Wordfence reports that this campaign happened last weekend, between May 29th and May 31st, where May 30th has seen a peak number of attacks. It claims to have blocked over 130 million attacks against 1.3 million sites and says there are more unrecorded attacks that might have happened. It further links the author behind it to be the same who’ve leveraged the cross-scripting vulnerability earlier, as most of the IP addresses in this campaign are the same from the first campaign. And here, stealing the credentials could give the attacker access to the site’s database, where he can add/remove users and manipulate content.

Checking and Safeguarding

Wordfence has also depicted the indicators of comprise, where a potential user who thinks if being attacked, can look up into his server logs. And if you find any log entry that contains wp-config.php in the query string that returned a 200 response code, you’re done. It’s advised to change the database password and authentication unique keys immediately.

Source: Wordfence

LEAVE A REPLY

Please enter your comment!
Please enter your name here