Security researchers from WordFence have observed a large-scale campaign over the weekend aimed at stealing configuration files from WordPress sites.
Threat actors attempted to exploit well- known vulnerabilities in unpatched plugins to download configuration files from WordPress sites and steal database credentials.
“Between May 29 and May 31, 2020, the Wordfence Firewall blocked over 130 million attacks intended to harvest database credentials from 1.3 million sites by downloading their configuration files.” reads the post published by WordFence.
“The peak of this attack campaign occurred on May 30, 2020. At this point, attacks from this campaign accounted for 75% of all attempted exploits of plugin and theme vulnerabilities across the WordPress ecosystem.”
The campaign accounted for 75% of all attempted exploits of WordPress issues, including plugin and theme vulnerabilities.
The campaign targeted more than 1.3 million WordPress sites, Wordfence blocked more than 130 million exploitation attempts on its network alone, but experts believe the magnitude of the attack is far greater.
Experts noticed that the campaign involved over 20,000 different IP addresses that were also used in an XSS campaign that was observed in early May.
The new campaign is targeting nearly a million new sites that weren’t included in the previous XSS campaigns.
“As with the XSS campaigns, almost all of the attacks are targeted at older vulnerabilities in outdated plugins or themes that allow files to be downloaded or exported. In this case the attackers are attempting to download wp-config.php, a file critical to all WordPress installations which contains database credentials and connection information, in addition to authentication unique keys and salts.” continues the analysis. “An attacker with access to this file could gain access to the site’s database, where site content and users are stored.”
According to WordFence experts, the two campaigns, have most likely been carried out by the same attackers.
Experts also published Indicators of Compromise (IoCs) for the campaign.
(SecurityAffairs – WordPress, hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.