WordPress Sites are Being Hacked in Fake Ransomware Attacks
A new wave of attacks starting late last week has hacked close to 300 WordPress sites to display fake encryption notices, trying to trick the site owners into paying 0.1 bitcoin for restoration.
These ransom demands come with a countdown timer to induce a sense of urgency and possibly panic a web admin into paying the ransom.
While the 0.1 bitcoin (~$6,069.23) ransom demand is not particularly significant compared to what we see on high-profile ransomware attacks, it can still be a considerable amount for many website owners.
Also Read: How often should you pen test?
Smoke and mirrors
These attacks were discovered by cybersecurity firm Sucuri who was hired by one of the victims to perform incident response.
The researchers discovered that the websites had not been encrypted, but rather the threat actors modified an installed WordPress plugin to display a ransom note and countdown when
In addition to displaying a ransom note, the plugin would modify all the WordPress blog posts and set their ‘post_status’ to ‘null,’ causing them to go into an unpublished state.
As such, the actors created a simple yet powerful illusion that made it look as if the site had been encrypted.
By removing the plugin and running a command to republish the posts and pages, the site returned to its normal status.
Also Read: What is a data protection officer? Through the lens of a Master DPO
Upon further analysis of the network traffic logs, Sucuri found that the first point where the actor’s IP address appeared was the wp-admin panel.
This means that the infiltrators logged in as admins on the site, either by brute-forcing the password or by sourcing stolen credentials from dark web markets.
This was not an isolated attack but instead appears to be part of a broader campaign, giving more weight to the second scenario.
As for the plugin seen by Sucuri, it was Directorist, which is a tool to build online business directory listings on sites.
Sucuri has tracked approximately 291 websites affected by this attack, with a Google search showing a mix of cleaned-up sites and those still showing ransom notes.
All of the sites seen by BleepingComputer in search results use the same 3BkiGYFh6QtjtNCPNNjGwszoqqCka2SDEc Bitcoin address, which has not received any ransom payments.
Protecting against site encryptions
Sucuri suggests the following security practices to protect WordPress sites from being hacked:
- Review admin users on the site, remove any bogus accounts, and update/change all wp-admin passwords.
- Secure your wp-admin administrator page.
- Change other access point passwords (database, FTP, cPanel, etc).
- Place your website behind a firewall.
- Follow reliable backup practices that will make restoration easy in the case of a real encryption incident.
As WordPress is commonly targeted by threat actors, it is also important to make sure all of your installed plugins are running the latest version.
0 Comments