Search This Blog
Popular Posts
-
Hello there! My blog post 'Spikes' was published on Sept. 22nd; however, the post before it called 'Flow' was published on...
-
Are you looking for the best WordPress themes for nonprofits? Charity and non-profit websites require appealing presentation with tools to...
-
The best Black Friday / Cyber Monday WordPress Deals in 2016 all in one place. If you missed the huge deals last year, be sure to get in...
-
Chris Hinds, COO of Road Warrior Creative, once worked up to 89 hours per week in the food industry. However, he found the lifestyle t...
-
CHECK OUR LATEST STYLISH WORDPRESS BLOG THEME UPDATE OF THE THEME Theme is WordPress 3.5 Ready! We just updated font setting...
-
Hot Off the Press Two New Blogging U. Courses Available On Demand Jun 20, 2016 @ 7:18 pm Michelle W. Jun 20, 201...
-
Google has some big plans when it comes to making the web faster on your mobile phone. The company just added AMP-enabled pages in its mobil...
-
How to Get WordPress Hosting WordPress, the world's top content management system (CMS), is far more than just the simple blogging pl...
-
Hi there, I see you are a Jetpack user. I checked your site on Jetpack Debug page (https://jetpack.com/support/debug/) for connection is...
-
One of the cool features of Azure is the ability to have a "deployment slot" for your web app. Web app content and configurations...
Blog Archive
- December (18)
- November (29)
- October (27)
- September (29)
- August (31)
- July (30)
- June (29)
- May (29)
- April (30)
- March (31)
- February (28)
- January (31)
- December (31)
- November (30)
- October (31)
- September (30)
- August (43)
- July (42)
- June (33)
- May (43)
- April (36)
- March (37)
- February (31)
- January (4)
- December (1)
- November (1)
- October (24)
- September (24)
- August (25)
- July (28)
- June (18)
- September (1)
Total Pageviews
Blogroll
Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites
One such incident happened recently when the renowned developer BestWebSoft sold a popular Captcha WordPress plugin to an undisclosed buyer, who then modified the plugin to download and install a hidden backdoor.
In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.
While reviewing the source code of the Captcha plugin, WordFence folks found a severe backdoor that could allow the plugin author or attackers to remotely gain administrative access to WordPress websites without requiring any authentication.The plugin was configured to automatically pull an updated "backdoored" version from a remote URL — https[://]simplywordpress[dot]net/captcha/captcha_pro_update.php — after installat ion from the official Wordpress repository without site admin consent.
This backdoor code was designed to create a login session for the attacker, who is the plugin author in this case, with administrative privileges, allowing them to gain access to any of the 300,000 websites (using this plugin) remotely without requiring any authentication. "This backdoor creates a session with user ID 1 (the default admin user that WordPress creates when you first install it), sets authentication cookies, and then deletes itself'" reads the WordFence blog post. "The backdoor installation code is unauthenticated, meaning anyone can trigger it." Also, the modified code pulled from the remote server is almost identical to the code in legitimate plugin repository, therefore "triggering the same automatic update process removes all file system traces of the backdoor," making it look as if it was never there and helping the attacker avoid detection.The reason behind the adding a backdoor is unclear at this moment, but if someone pays a handsome amount to buy a popular plugin with a large user base, there must be a strong motive behind.In similar cases, we have seen how organized cyber gangs acquire popular plugins and applications to stealthy infect their large user base with malware, adware, and spyware.While figuring out the actual identity of the Captcha plugin buyer, WordFence researchers found that the simplywordpress[dot]net domain serving the backdoor file was registered to someone named "Stacy Wellington" using the email address "scwellington[at]hotmail.co.uk."
Using reverse whois lookup, the researchers found a large number of other domains registered to the same user, including Convert me Popup, Death To Comments, Human Captcha, Smart Recaptcha, and Social Exchange.
What's interesting? All of the above-mentioned domains booked under the user contained the same backdoor code that the WordFence researchers found in Captcha.
WordFence has teamed up with WordPress to patch the affected version of Captcha plug-in and blocked the author from publishing updates, so websites administrators are highly recommended to replace their plugin with the latest official Captcha version 4.4.5.
WordFence has promised to release in-depth technical details on how the backdoor installation and execution works, along with a proof-of-concept exploit after 30 days so that admins get enough time to patch their websites.
Source: Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites
0 comments:
Post a Comment