![]() |
Massive WordPress site file integrity fail - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: General (https://sinister.ly/Forum-General) +--- Forum: World News (https://sinister.ly/Forum-World-News) +--- Thread: Massive WordPress site file integrity fail (/Thread-Massive-WordPress-site-file-integrity-fail) |
Massive WordPress site file integrity fail - ConcernedCitizen - 01-27-2022 ![]() Okay, it looks as if a critical file integrity fail - WordPress exploit - is being exploited in the wild. Quote:A massive supply chain attack compromised 93 WordPress themes and plugins to contain a backdoor, giving threat-actors full access to websites. PHP lets you call a function by putting brackets after a string dereference. Attackers used it to gain remote access via a snippet of backdoored code in the functions.php file on the sites. They did this by altering code from the AccessPress website that serves WP modules - and they did just that. It exposed 20,000 sites to the malware. It's not one-of-a-kind, however. It simply utilizes a similar technique to other webshells, by exploiting the string dereference to call a function embedded (and probably encoded) to the site, offering a remote shell or other persistence. This has been known as a bug in SEO plugins for a long time and WordPress would do well to shield further users from this as soon as possible. RE: Massive WordPress site file integrity fail - Dismas - 01-28-2022 100% being exploited currently. Due to Wordpress being semi-relevant to my work, I've seen the results firsthand. RE: Massive WordPress site file integrity fail - Boudica - 01-28-2022 This is concerning for those that use it. It's nice that the article gives people suggestions on how to see if their site has been affected: Code: If you have installed one of the compromised plugins or themes on your site, removing/replacing/updating them won’t uproot any webshells that may have been planted through it. RE: Massive WordPress site file integrity fail - ConcernedCitizen - 01-28-2022 (01-28-2022, 06:13 AM)Dismas Wrote: 100% being exploited currently. Due to Wordpress being semi-relevant to my work, I've seen the results firsthand.This is unfortunate. At least it wasn't public before they were working on a patch - well, not very long anyway. The IoC's make it easy to determine whether you're infected, so that's helpful. Other webshells completely reverse the code that was changed, allowing to essentially hide further to allow more persistence. |