Article Details

Scrape Timestamp (UTC): 2024-03-07 13:51:30.627

Source: https://thehackernews.com/2024/03/hacked-wordpress-sites-abusing-visitors.html

Original Article Text

Click to Toggle View

Hacked WordPress Sites Abusing Visitors' Browsers for Distributed Brute-Force Attacks. Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form of distributed brute-force attacks, "target WordPress websites from the browsers of completely innocent and unsuspecting site visitors," security researcher Denis Sinegubko said. The activity is part of a previously documented attack wave in which compromised WordPress sites were used to inject crypto drainers such as Angel Drainer directly or redirect site visitors to Web3 phishing sites containing drainer malware. The latest iteration is notable for the fact that the injections – found on over 700 sites to date – don't load a drainer but rather use a list of common and leaked passwords to brute-force other WordPress sites. The attack unfolds over five stages, enabling a threat actor to take advantage of already compromised websites to launch distributed brute-force attacks against other potential victim sites - "For every password in the list, the visitor's browser sends the wp.uploadFile XML-RPC API request to upload a file with encrypted credentials that were used to authenticate this specific request," Sinegubko explained. "If authentication succeeds, a small text file with valid credentials is created in the WordPress uploads directory." It's currently not known what prompted the threat actors to switch from crypto drainers to distributed brute-force attack, although it's believed that the change may have been driven by profit motives, as compromised WordPress sites could be monetized in various ways. That said, crypto wallet drainers have led to losses amounting to hundreds of millions in digital assets in 2023, according to data from Scam Sniffer. The Web3 anti-scam solution provider has since revealed that drainers are exploiting the normalization process in the wallet's EIP-712 encoding procedure to bypass security alerts. The development comes as the DFIR report revealed that threat actors are exploiting a critical flaw in a WordPress plugin named 3DPrint Lite (CVE-2021-4436, CVSS score: 9.8) to deploy the Godzilla web shell for persistent remote access. It also follows a new SocGholish (aka FakeUpdates) campaign targeting WordPress websites in which the JavaScript malware is distributed via modified versions of legitimate plugins that are installed by taking advantage of compromised admin credentials. "Although there have been a variety of maliciously modified plugins and several different fake-browser update campaigns, the goal of course is always the same: To trick unsuspecting website visitors into downloading remote access trojans that will later be used as the initial point of entry for a ransomware attack," security researcher Ben Martin said. State of AI in the Cloud 2024 Find out what 150,000+ cloud accounts revealed about the AI surge. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class threat intelligence from Censys Search.

Daily Brief Summary

MALWARE // WordPress Sites Compromised to Launch Brute-Force Attacks

WordPress sites have been compromised by hackers using JavaScript injections to facilitate distributed brute-force attacks.

Security researchers from Sucuri detected over 700 sites where malicious scripts were used to attack other WordPress sites using common and leaked passwords.

The attacks are conducted through the visitors' browsers without their knowledge, trying to upload files with encrypted credentials to other sites via the XML-RPC API.

It is unclear why attackers shifted from using crypto wallet drainers to brute-force methods, but the change might be profit-driven.

Despite a focus on brute-forcing, crypto drainers have caused digital asset losses in the hundreds of millions in 2023.

Threat actors exploit a critical vulnerability in the 3DPrint Lite WordPress plugin to install the Godzilla web shell for persistent access.

A new campaign using SocGholish (aka FakeUpdates) distributes JavaScript malware through modified versions of legitimate WordPress plugins by exploiting admin credentials.