• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hacked wordpress sites abusing visitors' browsers for distributed brute force attacks

Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks

You are here: Home / General Cyber Security News / Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks
March 7, 2024

Threat actors are conducting brute-drive attacks versus WordPress web sites by leveraging malicious JavaScript injections, new conclusions from Sucuri reveal.

The attacks, which choose the variety of dispersed brute-pressure attacks, “focus on WordPress internet sites from the browsers of completely innocent and unsuspecting web site people,” security researcher Denis Sinegubko stated.

The action is aspect of a previously documented attack wave in which compromised WordPress web pages ended up utilized to inject crypto drainers this sort of as Angel Drainer straight or redirect website visitors to Web3 phishing web sites made up of drainer malware.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The most up-to-date iteration is notable for the truth that the injections – found on about 700 web-sites to date – do not load a drainer but rather use a list of typical and leaked passwords to brute-drive other WordPress websites.

Cybersecurity

The attack unfolds around 5 stages, enabling a risk actor to consider benefit of now compromised internet websites to launch distributed brute-power attacks versus other likely sufferer websites –

  • Obtaining a list of focus on WordPress web sites
  • Extracting actual usernames of authors that write-up on those domains
  • Inject the malicious JavaScript code to presently contaminated WordPress web pages
  • Launching a dispersed brute-force attack on the goal websites through the browser when website visitors land on the hacked web-sites
  • Gaining unauthorized entry to the target web pages

“For each individual password in the listing, the visitor’s browser sends the wp.uploadFile XML-RPC API request to add a file with encrypted qualifications that have been utilized to authenticate this unique ask for,” Sinegubko spelled out. “If authentication succeeds, a compact textual content file with valid qualifications is established in the WordPress uploads listing.”

It’s at the moment not recognized what prompted the danger actors to swap from crypto drainers to distributed brute-pressure attack, while it really is considered that the alter may perhaps have been pushed by income motives, as compromised WordPress internet sites could be monetized in many techniques.

That said, crypto wallet drainers have led to losses amounting to hundreds of thousands and thousands in electronic assets in 2023, according to details from Scam Sniffer. The Web3 anti-scam answer supplier has considering the fact that unveiled that drainers are exploiting the normalization procedure in the wallet’s EIP-712 encoding treatment to bypass security alerts.

Cybersecurity

The development arrives as the DFIR report disclosed that danger actors are exploiting a critical flaw in a WordPress plugin named 3DPrint Lite (CVE-2021-4436, CVSS rating: 9.8) to deploy the Godzilla web shell for persistent distant obtain.

It also follows a new SocGholish (aka FakeUpdates) campaign targeting WordPress websites in which the JavaScript malware is dispersed through modified variations of legitimate plugins that are mounted by taking advantage of compromised admin qualifications.

“While there have been a wide range of maliciously modified plugins and many distinct faux-browser update campaigns, the target of system is normally the similar: To trick unsuspecting website visitors into downloading remote access trojans that will later on be utilized as the initial stage of entry for a ransomware attack,” security researcher Ben Martin said.

Identified this post exciting? Adhere to us on Twitter  and LinkedIn to browse much more exclusive written content we publish.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «chinese state hackers target tibetans with supply chain, watering hole Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks
Next Post: CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability cisa warns of actively exploited jetbrains teamcity vulnerability»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.