4 June 2020

Massive campaign targets over 1 million WordPress websites in attempt to steal database credentials


Massive campaign targets over 1 million WordPress websites in attempt to steal database credentials

The Wordfence researchers have detected a large-scale campaign against WordPress websites in which attackers were trying to exploit old cross-site scripting (XSS) vulnerabilities in WordPress plugins and themes in an attempt to steal database credentials.

Wordfence said that between May 29 and May 31 it blocked over 130 million attacks intended to harvest database credentials fr om 1.3 million sites. The goal of the attacks was to download wp-config.php files fr om unpatched websites and gain access to the site’s content and credentials.

Wp-config.php is a file wh ere WordPress stores site’s database information. This configuration file is usually located in the root of WordPress file directories and contains websites’ database credentials and connection information.

“The peak of this attack campaign occurred on May 30, 2020. At this point, attacks from this campaign accounted for 75% of all attempted exploits of plugin and theme vulnerabilities across the WordPress ecosystem,” Wordfence said.

The researchers said the attacks were launched from over 20,000 different IP addresses that previously were used in another campaign that targeted WordPress sites at the end of April wh ere attackers attempted to inject a malicious JavaScript into websites, which would redirect visitors to malvertising sites or take advantage of an administrator’s session to plant a PHP backdoor.

“If your server is configured to allow remote database access, an attacker with your database credentials could easily add an administrative user, exfiltrate sensitive data, or delete your site altogether. Even if your site does not allow remote database access, an attacker who knows your site’s authentication keys and salts may be able to use them to more easily bypass other security mechanisms,” the researchers pointed out.

Back to the list

Latest Posts

China-linked LightSpy iOS implant re-emerges, targets South Asia

China-linked LightSpy iOS implant re-emerges, targets South Asia

LightSpy contains modules designed to exfiltrate device information and saved files.
16 April 2024
Cryptojacker indicted for defrauding cloud service providers of $3.5M

Cryptojacker indicted for defrauding cloud service providers of $3.5M

Parks allegedly manipulated the cloud providers into granting him elevated privileges and benefits.
16 April 2024
Firebird RAT developers and sellers arrested in the US and Australia

Firebird RAT developers and sellers arrested in the US and Australia

The malware allows to remotely access victims' computers and perform illicit activities.
16 April 2024