X
Tech

WordPress sites under attack as hacker group tries to create rogue admin accounts

Hackers exploit vulnerabilities in more than ten WordPress plugins to plant backdoor accounts on unpatched sites.
Written by Catalin Cimpanu, Contributor
wordpress.jpg

A hacker group is exploiting vulnerabilities in more than ten WordPress plugins to create rogue admin accounts on WordPress sites across the internet.

The attacks are an escalation part of a hacking campaign that started last month. During previous attacks, the hackers exploited vulnerabilities in the same plugins to plant malicious code on the hacked sites. This code was meant to show popup ads or to redirect incoming visitors to other websites.

However, two weeks ago, the group behind these attacks changed its tactics. Mikey Veenstra, a threat analyst with cybersecurity firm Defiant, told ZDNet today that starting with August 20, the hacker group modified the malicious code planted on hacked sites.

Instead of just inserting pop-ups and redirects, the malicious code also ran a function in order to test if the site visitor had the ability to create user accounts on the site, a feature only available for WordPress admin accounts.

Basically, this malicious code waited for the site owner to access their own websites. When they did, the malicious code created a new admin account named wpservices, using the email address of wpservices@yandex.com, and password of w0rdpr3ss.

By creating these accounts, the hacker group behind this campaign changed tactics from exploiting sites for monetary profits, to also adding backdoors for future use, and for a more persistence foothold.

According to Veenstra, these recent attacks are targeting older vulnerabilities in the following plugins.

The plugins are linked to their respective vulnerabilities, so readers can determine the version to which they need to update, to prevent attacks, in case they're using one of the plugins.

After updating the following plugins, site owners are also advised to check admin usernames registered on their sites. Removing these accounts is imperative, as their sole purpose was to create a way back into websites after users updated the vulnerable plugins.

Cleaning infected WordPress sites can be quite complicated, as site owners will also have to scan their websites with WordPress security plugins in search for various other backdoor mechanisms the hackers might have left behind. Non-technical users are advised to seek professional help.

WordPress 5.0 is out. Here's a tour of the new features!

Editorial standards