Email this article   Print article 


WordPress Bloggers Beware: You're Easy Pickings For Cybercriminals

By Robert Westervelt
May 03, 2013    10:30 AM ET

Dozens of unpatched vulnerabilities in the WordPress blogging platform and potentially hundreds in third-party components are making easy pickings for cybercriminals, according to security researchers at Dell-SecureWorks, who urged bloggers to apply updates.

Researchers at Dell-SecureWorks said failing to apply WordPress updates is a widespread problem among the blogging platform's user base, estimated to be supporting 64 million websites. A recent spate of attacks targeting third-party plug-ins, including one targeting a popular caching engine, has made patching even more critical for WordPress users, wrote Dennis Dwyer, a researcher at Dell-SecurWorks in a warning issued this week.

"Although WordPress is considered a mature platform, regular updates address serious security vulnerabilities that may be used by an attacker targeting a WordPress site," Dwyer wrote.

[Related: 5 Ways To Avoid A Stolen Password Pitfall]

Security researchers detected a wave of WordPress attacks last month, with thousands of websites impacted by the campaign. Attackers were brute-forcing admin passwords in an attempt to gain access to hosting provider servers.

The problem of poorly maintained WordPress installations can stem from hosting providers, which sometimes supply customers with preinstalled versions of the platform, according to Dwyer.

"Given the potential for harm in using outdated software, look for WordPress exploits to become more of an issue in the future, especially for shared hosting providers," Dwyer wrote.

Jeremiah Grossman, founder and CTO of WhiteHat Security, told CRN that WordPress sites are not managed well, allowing a single attacker to easily infect thousands of sites in a single attack campaign with an automated toolkit.

"WordPress is built in PHP so you're absolutely going to have cross-site scripting and SQL injection errors," Grossman said.

PHP-coded sites also are prone to remote file inclusion vulnerabilities, which can open the site up to attacks using malicious JavaScript, code execution on the Web server and potentially data theft. "It's pretty specific to PHP and it's a way to get command access to the application and initiate local system commands," Grossman said.

Most WordPress sites are infected by phishers, who use them to host malicious code that infects visitors with malware. Exploits targeting flaws are sometimes easily obtainable, according to Dell-SecureWorks' Dwyer. The Metasploit penetration framework includes several modules targeting cross-site scripting vulnerabilities in WordPress sites.

"The existence of these exploit modules makes it easier for an unskilled attacker to launch attacks and underscores the importance of keeping WordPress up to date," Dwyer wrote.

Dell-SecureWorks' Dwyer recommends WordPress users implement strong password policies and abide by a regular update schedule. WordPress typically issues an update every six months, while third-party plug-ins may be updated at any time, Dwyer said. WordPress provides an auto-update feature, but the functionality doesn't always work, he said. Users also can refer to the Hardening WordPress guide maintained by the platform.

PUBLISHED MAY 3, 2013

To continue reading this article, please download the free CRN Tech News app for your iPad or Windows 8 device.
Related: Videos | Slide Shows | Comments

SHARE THIS ARTICLE

More Security

Recent Articles

5 Ways To Avoid A Stolen Password Pitfall

Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk.

5 Phishing Attack Trends You May Have Missed

Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns.

Verizon Analysis: Top 10 Causes Behind Data Breaches

Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012.

  More Slide Shows




Related Videos
Loading...