• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

Millions of WordPress accounts targeted in major cyberattack

June 5, 2020
Share on FacebookShare on Twitter

Hundreds of thousands of WordPress websites were targeted over the course of 24 hours in a large scale cyberattack with the aim of harvesting database credentials.

The cybercriminals behind the attack were attempting to download the wp-config.php configuration files from users WordPress sites as they contain valuable information including database credentials, connection info, authentication unique keys and salts.

They tried to exploit known cross-site scripting (XSS) vulnerabilities in WordPress plugins and themes installed on users’ sites as a means to gain access to their credentials with the end goal of completely taking over their sites.

In a blog post, QA engineer and threat analyst Ram Gall provided further insight on the sheer scale of the campaign, saying:

“Between May 29 and May 31, 2020, the Wordfence Firewall blocked over 130 million attacks intended to harvest database credentials from 1.3 million sites by downloading their configuration files. The peak of this attack campaign occurred on May 30, 2020. At this point, attacks from this campaign accounted for 75% of all attempted exploits of plugin and theme vulnerabilities across the WordPress ecosystem.”

Targeting WordPress accounts

Security researchers at Wordfence were able to link this campaign to another large-scale attack that began on April 28 by analyzing the 20,000 different IP addresses used in this latest attack.

In the previous campaign, the threat actor the company tracked tried to plant backdoors or redirect visitors to malvertising sites by exploiting XSS vulnerabilities in plugins that had been patched but had yet to have been updated by WordPress site owners.

In just one day on May 3, the attackers behind these campaigns managed to launch over 20m attacks against more than half a million sites.

As is often the case, WordPress site owners can defend against these types of attacks by ensuring that all of the plugins and themes installed on their sites have been updated to the latest version and by applying and patches released by their creators. Additionally, they should delete or disable outdated themes and plugins that have been removed from the official WordPress repository since they are no longer being maintained.

Via BleepingComputer

Next Post

How to watch UFC 250 Nunes vs. Spencer: Live stream tomorrow's fight with ease

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Uber expands women-only tool across entire U.S.
  • Italy’s Mirai Robotics raises $4.2M to build autonomous ships
  • Qualcomm plots out 6G, Wi-Fi 8 future with AI as the new user interface
  • Best TV deal: Save 13% on the 43-inch Samsung Class Crystal LED 4K TV
  • Google is still fixing the Pixel 10’s graphics issues in its March security update

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously