Tampilkan postingan dengan label wordpress security. Tampilkan semua postingan
Tampilkan postingan dengan label wordpress security. Tampilkan semua postingan

Selasa, 02 Februari 2016

An Attack Platform Infecting WordPress Sites

Wordpress Security Updates
At DP2Web, we often research hacked customer websites as a component of a progressing R&D effort to enhance our center scanning engine. Analyzing hacked sites gives us information on how the attackers picked up section and furnishes us with perceivability on the most recent attack tools. It likewise furnishes us with signatures we can add to our center scanning engine that enhances our capacity to distinguish and save a hack.

Amid a late examination of a huge infections we found a trove of assault tools that all indicated back a solitary "meta" script. This script was just two lines in length however furnished an attacker with an intense capability. When it completely introduces itself it gives what we are alluding to as an "attack platform".

We figured out the script and uncovered that it was downloading it's full source code from pastebin.com which is a webpage where anybody can post any content anonymously. The attacker had posted the source on pastebin and the script would download itself from that point and execute. The impact of this is the starting disease is just two lines in length.

The platform once completely introduced furnishes an attacker with 43 attack tools they can then download, likewise from pastebin, with a single click. The usefulness these tools give incorporates:
  • Complete attack shells that let you deal with the filesystem, access the database through a very much outlined SQL client, view framework information, mass taint the framework, DoS different systems, find and contaminate all CMS's, view and oversee client accounts both on CMS's and the nearby operating framework and considerably more. 
  • A FTP brute force attack tools 
  • A Facebook brute force aggressor 
  • A WordPress brute force attack script 
  • Tools to examine for config documents or sensitive information 
  • Tools to download the whole webpage or parts thereof 
  • The capacity to examine for different attackers shells 
  • Tools focusing on particular CMS's that let you change their design to have your own malicious code 

On account of this disease, the source has all the earmarks of being a hacking bunch in Vietnam and one individual inside of that gathering.

To give you some understanding into the effective capability that this platform gives, Wordfence have made a video show where we taint a test virtual machine with the two line meta script and utilize it to download the tools it gives.

 
A Demonstration of a Meta Attack Tool Targeting WordPress sites from Wordfence.

Note that we did this showing inside a clean new virtual machine and incorporated our very own couple tools to avert further contamination and information exfiltration. These incorporate forcing all system activity from this machine by means of a proxy with the goal that we can see what is arriving and leaving from this infected test machine.

As should be obvious, attackers have grown inconceivably refined techniques and tools to trade off and abuse your site. As a site proprietor your first need ought to be to keep the aggressor from picking up section to your site. Wordfence's WordPress Security Learning Center is an awesome asset for you to take in more about what moves you ought to be making to ensure yourself.

Your second need ought to be to distinguish a hack as fast as could be allowed ought to one happen. This article on recognizing a hack early contains an intensive rundown of steps you can take to minimize the time from disease to disclosure. Likewise, we emphatically prescribe moving up to Wordfence Premium in the event that you haven't as of now. It permits you to timetable outputs to run regularly, enhancing your chances of getting a trade off right on time.

We trust you have found this showing accommodating. If you don't mind leave your remarks beneath and make certain to impart this post to the group. 

(Source: Wordfence)

Kamis, 22 Oktober 2015

Akismet XSS Vulnerability : Wordpress Security Update

XSS Attack - Cross Site Scripting AttacksA scientist from Sucuri told us of a XSS vulnerability in the Akismet WordPress plugin. This bug influences all versions of the Akismet WordPress plugin since 2.5.0, however we have no confirmation that it has been misused in nature. 

A vulnerability in Akismet found a week ago and due to fact that Akismet is a standout amongst the most broadly utilized plugins for WordPress, we needed to draw it out into the open. 

Akismet is a comment spam channel for WordPress and when all is said in done, it makes an awesome showing. The Akismet team reported on their web journal a week ago that a cross website scripting (XSS) vulnerability had been found in all versions of Akismet since 2.5.0. 

The vulnerability permits an hacker to post a remark on a WordPress site which will execute javascript in the WordPress administrator console. This is a normal XSS vulnerability example and one of the assaults it empowers would permit an aggressor to take a WordPress head's treats and increase regulatory access to a WordPress site. 

There is no proof that the vulnerability has been abused in nature. The Akismet and WordPress teams instantly took the accompanying activities: 

  • They released updates for every single influenced version of Akismet. 
  • The WordPress.org team issued an automatic upgrade of the Akismet plugin on influenced sites. In the event that you saw that your WordPress site was automatically moved up to the freshest version of Akismet, that is the reason. 
  • The Akismet team adjusted their API so that if a hacker did attempt to endeavor a helpless version of Akismet, their API would shut the assault by sifting through the remark the hacker attempted to post. This means when the vulnerability was found and the Akismet team rolled out this improvement, even defenseless versions of Akismet were no more exploitable. 

Kudos to the Akismet team for reacting to this so quickly and completely. In case you're running Akismet, we prescribe you sign into your WordPress site and ensure that Akismet has been redesigned to the most up to date version. 

To update, visit the Updates page of your WordPress dashboard and take after the instructions. In the event that you have to download the plugin compress document straightforwardly, links to all versions are accessible in the WordPress plugins directory.

Selasa, 23 Juni 2015

Safety first - Microsoft Site Hacked

Microsoft Wordpress Website Hacked
Nobody is resistant to hacks. It doesn't make a difference on the off chance that you are a small business with 10 employees or an immense business with 10,000 employees. This was proved when the Microsoft site, digitalconstitution.com, was found to contain various spammy pages and links in its website. The site, as per ZDNet, was running an older variant of WordPress which made it helpless to the attack. This ought to likewise serve as a calming suggestion to every one of us. 

At the point when was the last time you took a gander at the plugins you were utilizing on your site? What about your themes? Do you truly require every one of them? Are there any simply staying there, not upgraded and incapacitated? A significant number of the adventures and hacks that happen today to WordPress sites are an immediate consequence of outdated themes and plugins. In the event that you are unrealistic to ever utilize that truly perfect slider plugin that you never got around to playing with then why do regardless you have it? What about those 10 distinct themes you transferred when you were supposing about upgrading the site? Truly, would you say you are constantly going to utilize them? In the event that the response to any of those inquiries is no, then dispose of them. 

What about the plugins you do utilization? Is there any reason that you are as yet utilizing an old outdated and unmaintained plugin that hasn't been upheld in years? Is the usefulness so vital that you are willing to hazard your site's security on it? Is it worth the time, the vitality, lost business, and lost rest that will inescapably come when your site is misused and diverts everybody to a seaward drug store? With 38,461 plugins in the WordPress.org vault at the season of this passage there are presumably no less than a few that will give the same reason yet that are upgraded and evaluated to work with the flow rendition of WordPress. 

How about we additionally not disregard the core WordPress software. WordPress doesn't discharge new forms just to discharge something. They contain security fixes, bug patches, and, yes, even some new usefulness or changes. In the event that you are running an outdated form of WordPress, then you likely have gaps in your website's security. 

Without a doubt, its enticing to jab fun when the huge fellows get egg all over. In any case, gain from their errors. Keep up your website. Redesign your software, themes, and plugins. The contrast between the enormous gentlemen and you is this: They have a group that will settle their site for them on the off chance that they get hacked. You have you, and in case you're fortunate, a much smaller group. A touch of redesigning and upkeep now will keep you from being the following measurement. 

A bit of redesigning and upkeep now will keep you from being the following measurement.

Source: Wordfence

Jumat, 13 Maret 2015

SQL injection vulnerability in WooCommerce : Wordfence

Wordpress Woocommerce Vulnerability


Yesterday Matt Barry, researchers at Wordfence discovered a SQL injection vulnerability in WooCommerce version 2.3.5 and more established amid a code review of the plugin storehouse. WooCommerce is introduced on more than 1 million active WordPress websites.

Wordfence has quickly reached Woo about the issue and they've been unimaginably responsive, discharging a fix early today with their arrival of WooCommerce version 2.3.6.

We emphatically recommend you instantly upgrade on the off chance that you have not as of now.

The particular issue is a SQL injection weakness in the administrator board. Inside the Tax Settings page of WooCommerce, the key of the "tax_rate_country" POST parameter is passed unescaped into a SQL insert articulation. For instance, a payload of tax_rate_country[(SELECT SLEEP(10))] would result in the MySQL server to rest for 10 seconds.

Since this helplessness requires either a Shop Manager or Admin client account, it would need to be consolidated with a XSS attack so as to be misused.

What to do: Upgrade promptly to version 2.3.6 of WooCommerce which contains the fix.

Thanks to the WooThemes team for instantly tending to the issue and pushing the fix inside a couple of HOURS of accepting the report.

If you don't mind make sure to tweet, FB or email as expected to help spread the saying to your kindred WordPress site admins.

Jumat, 05 Desember 2014

Google to phase out CAPTCHA codes with single click feature

Google introduces No-Captcha
In the event that you've needed an account recently, you've probably seen it: a quick test that provides for you a couple of mutilated words and requests that you write them back in plaintext. The official name is CAPTCHA, a test designed to weed out the robotized scripts utilized for spam, yet its been broken for quite a while. Google recently flaunted a framework that could crack it 99.8 percent of the time, and most spammers are happy to run their scripts knowing only one in ten will sneak past. At the same time despite the fact that everybody knows CAPTCHA is broken, there hasn't been a clear idea of what may replace it.

Early today, Google is divulging the best answer yet. It's called No-CAPTCHA (reCAPTCHA), another methodology based on another API, and its as of now been adopted by Snapchat, Wordpress and Humble Bundle, in addition to different partners. As opposed to asking users to pass a test, Google's new framework prescreens each client's conduct and filters out any individual who's effectively identifiable as human. Most users will just see a check mark — click the box and you've passed the test — while anybody marked as suspicious will be given a more elaborate test. 

Google ReCAPTCHA Features Demo


Sometimes, that test will be the same old text-recognition problem — yet sometimes it will be something new. Google is exploring different avenues regarding more mobile-friendly forms of CAPTCHA, in the same way as a test that would demonstrate to you a picture of a feline and requested that you choose comparative photos from a grid. (Information gathered thusly would likewise be utilized to enhance Google's Image Search, proceeding with the practice from previous tests.) As the project advances, we'll see significantly more versions of the test, based on top of the new, more flexible API.

Google engineers said the prescreening would take a gander at factors like IP addresses and time used on page, yet were cagey about precisely what information would be utilized, refering to concerns that spammers would control calculations accordingly. The prescreening additionally fluctuates broadly from site to site: a little more than 80 percent of Humble Bundle guests were cleared in advance, however for Wordpress everywhere, that number dropped to 60 percent. It relies on upon the guests, additionally on the site's general plan and how clear a flag its sending along to Google.

The old API will stay dynamic, and numerous sites may decline to upgrade, however the general effect will be a ton less translating text for the normal web client - and assuredly less spam. It's likewise an intriguing tackle the present day web, where boundless checking has made passive behavioral distinguishing proof more effective than dynamic testing. Nowadays, the most effortless approach to advise a client is human isn't to make inquiries, yet to perceive how they act. 


Mobile friendly Capchas - Online Security Tools