According to a study conducted by Sucuri, the campaign, which it named "Balada Injector," is prolific and Methuselah-like in its endurance, infecting victim sites with malware at least since 2017. After being injected into the page, the malicious code leads users to a variety of scam websites, such as those offering fake tech support, bogus lottery wins, and push notifications requesting Captcha solutions.
However, behind the scenes, injected scripts look for numerous files, including access logs, error logs, debug information files, database management tools, administrator credentials, and more, that might include any sensitive or potentially helpful information. In addition, backdoors are loaded into the websites for enduring access and, occasionally, site takeover.
While the 1 million statistic represents the total number of sites that have been infected over the past five years, researchers only recently linked all the activities into a single operation. The campaign is still going strong and does not appear to be slowing down.
Sucuri researchers were able to link all of the observed activity to the Balada Injector campaign since it has a few easily distinguishable attributes. These include using a rotating roster of domain names where malicious scripts are placed on haphazard subdomains, uploading and leaving numerous backdoors all across the hacked environment, and spammy redirects.
Moreover, the developers of Balada Injector also exploit security flaws in WordPress plug-ins and themes, which is likely most noteworthy. These modular WordPress add-ons enable site administrators to integrate a variety of features, such as polling support, message board assistance, or click-to-call integration for e-commerce businesses.
"All sorts of vulnerabilities in WordPress themes and plugins can allow an attacker to inject code or gain unauthorized access to the website — which can eventually be escalated to the level where code injections are possible[…]This entire time, Balada Injector has been quickly adding newly disclosed vulnerabilities (and sometimes disclosed zero-days), occasionally starting massive waves of infections within a few hours after vulnerability disclosures," Sucuri analysis explains.
Sucuri has been tracking new waves of activity happening every couple of weeks, with lulls in between that are "probably utilised for gathering and testing newly reported and zero-day vulnerabilities."
Moreover, older vulnerabilities are also included in the mix, with some still in use by the campaign for months or years after being patched.
Given how the WordPress ecosystem is extremely buggy, it has become a popular target for cybercriminals among any other stripes.
"Depending on how you measure it, in 2023, WordPress still powers 60% of the websites available on the Internet today[…]The sheer volume of code that goes into this, the degree of customization often present on WordPress sites, and in general the WordPress plug-in ecosystem's complexity, popularity, and the lack of consistent security measures and practices, contribute to its attractiveness to cybercriminals as a rich hunting ground for exploitable bugs," says Casey Ellis, founder, and CTO at the Bugcrowd bug bounty platform.
To safeguard oneself against Balada Injector and other WordPress threats, companies must first ensure that all of their website software is updated, delete unused plug-ins and themes, and implement a Web application firewall to protect against Balada Injector and other WordPress threats.
According to Mike Parkin, senior technical engineer at Vulcan Cyber, the ease with which plug-ins can be added to WordPress from authorized download stores (much like the ecosystem for mobile apps) adds to the security issue. As a result, education for the Web team regarding the risks of installing unapproved modules is also necessary.
"The myriad available plug-ins, multiple places to get them, and the ease of deployment — you have a recipe for easy malicious plug-in distribution," he says.
Even large organizations are not resistant to WordPress Security problems. "There are cases, even in large enterprises, where a website is developed and maintained by an individual or small team[…]Often, those folks aren’t especially security conscious and are more interested in keeping their site up and fresh than they are in doing it securely. Patches get missed. Security alerts get missed. New and interesting plug-ins get installed without making sure they are safe or, sometimes, even work," he adds.
Real estate sites are one of the most famous and thriving sites on the web, and WordPress is one of the most generally used content management systems (CMS) for making and handling these sites. But recent reports have disclosed that there is a flaw in one of the most popular real estate themes for WordPress that has been abused by threat actors to get access to personal info and hack websites.
The flaw exists in the WP Residence theme, which thousands of real estate websites use across the world. The theme lets site owners to make and manage property listings, show property details, and handle user inquiries. The issue coms from a vulnerability in the theme’s code, which lets threat actors to execute arbitrary code and get administrative privileges on the site.
When the threat actors gain access to the website’s backend, they can steal sensitive information, like user credentials, personal data, and financial information. They can also deploy malicious code, which can cause more dangerous attacks, like spreading malware or ransomware, disrupting the site, or launching a distributed denial-of-service (DDoS) attack.
The flaw was first found by Wordfence, a leading cybersecurity firm that specialises in WordPress security. The firm discovered that the flaw was being actively exploited in the open, which hints that threat actors were already exploiting it to hack real estate websites. The vulnerability impacted all variants of the WP Residence theme up to version 1.60.3, which was launched in January 2021.
Wordfence immediately alerted the theme’s developers, who released a patch to fix the issue. The patch was included in version 1.60.4, which was released in February 2021. Website owners who use the WP Residence theme are urged to update to the latest version as soon as possible to protect their website from potential attacks.
This incident highlights the importance of keeping your website up-to-date with the latest software patches and security updates. Even popular and well-maintained themes and plugins can contain vulnerabilities that can be exploited by hackers. Therefore, it’s essential to have a robust security strategy in place, which includes regular backups, malware scans, and security audits.
In conclusion, the vulnerability in the WP Residence theme is a reminder that no website is immune to cyber-attacks. Website owners need to be vigilant and proactive in securing their websites, especially if they handle sensitive information or financial transactions. By following best practices for website security and staying informed about the latest threats and vulnerabilities, website owners can protect their website and their users from harm.
Credit : Sucuri |