
Thursday, August 18, 2016
WordPress Security Las Vegas -
Last week we shared the top 20 most attacked WordPress themes and an explanation of why many of them are targeted. This week we’ve dug deep into the data and we are publishing the top 50 most attacked WordPress plugins during the past 7 days.
The data we’re sharing today is based on the following high level metrics:
During the past week Wordfence blocked 20,644,496 unique attacks across all the sites we protect.
We saw attacks from 73,629 unique IP addresses during the period.
20,622,975 attacks came from IPv4 addresses and 15,160 of those attacks were IPv6 addresses.
Of the approximately 1.5 million active websites that we protect, 581,689 of those sites received attacks during the past week.
The following is a list of plugins that received the most attacks during the past week – counted as the most recent 7 days starting on Tuesday evening August 16th and looking back 7 days. Once again we are showing the plugin ‘slug’ which is the unique directory name that the plugin uses when it installs into WordPress.
This week we are ordering things slightly differently. We have the plugins ordered by number of unique sites that received attacks, labeled as “Sites attacked”. We feel this is a more useful order because it shows how widespread an attack is on a particular plugin, rather than just raw volume of attacks.
“Total Attacks” indicates the total number of attacks that we logged on that plugin. “IPs” is the total number of unique IP addresses that an attack targeting the plugin originated from.
“Type” is the type of attack – in most cases it’s a “Local File Inclusion” attack which allows an attacker to download any file they want to on the target system. The vast majority of files that are targeted are either the wp-config.php file which contains the database username, password and server name or /etc/passwd which contains the host operating system usernames.
Where we’ve labeled the Type as “Shell” it indicates an attack that allows an attacker to upload a shell to the target site which gives them full remote access. These are the most serious vulnerabilities and attacks.
All attacks are on vulnerabilities that are already publicly known. If you run any of these WordPress plugins, make sure that:
You are using the newest version of the plugin.
That version does not have any known vulnerabilities.
You are running Wordfence with the Firewall enabled because we protect against all vulnerabilities shown.
The list of the top 50 most attacked plugins during the past week follows:
Plugin
Sites attacked
Total attacks
IPs
Type
recent-backups
182,525
351,014
3,467
LFI
wp-symposium
149,860
242,715
3,460
Shell
google-mp3-audio-player
138,282
307,743
2,032
LFI
db-backup
129,519
287,043
2,189
LFI
wptf-image-gallery
107,000
131,938
2,846
LFI
wp-ecommerce-shop-styling
103,471
131,011
2,887
LFI
candidate-application-form
103,017
127,359
2,820
LFI
wp-miniaudioplayer
91,546
196,557
1,381
LFI
ebook-download
88,461
189,640
1,408
LFI
ajax-store-locator-wordpress_0
86,051
119,192
1,396
LFI
hb-audio-gallery-lite
82,041
105,618
1,505
LFI
simple-ads-manager
70,683
166,131
6,476
Shell
revslider
53,549
145,626
407
Shell
inboundio-marketing
53,063
112,696
874
Shell
wpshop
51,609
111,546
830
Shell
dzs-zoomsounds
51,089
225,032
731
Shell
reflex-gallery
49,853
111,624
699
Shell
wp-mobile-detector
38,764
115,235
800
Shell
formcraft
25,192
52,604
668
Shell
sexy-contact-form
19,076
50,649
316
Shell
filedownload
12,584
19,400
353
LFI
plugin-newsletter
11,982
23,887
451
LFI
simple-download-button-shortcode
11,558
21,502
427
LFI
pica-photo-gallery
11,059
16,587
262
LFI
tinymce-thumbnail-gallery
10,972
16,429
263
LFI
dukapress
10,814
16,235
333
LFI
wp-filemanager
10,756
16,634
331
LFI
history-collection
10,427
24,371
607
LFI
s3bubble-amazon-s3-html-5-video-with-adverts
10,312
24,011
595
LFI
simple-image-manipulator
7,268
8,272
448
LFI
ibs-mappro
5,555
18,738
448
LFI
image-export
5,442
6,047
266
LFI
abtest
5,431
5,885
297
LFI
wp-swimteam
5,119
5,433
238
LFI
contus-video-gallery
4,921
17,866
345
LFI
sell-downloads
4,393
4,746
240
LFI
brandfolder
4,268
4,619
230
LFI
thecartpress
4,164
4,534
274
LFI
advanced-uploader
4,066
4,351
203
LFI
aviary-image-editor-add-on-for-gravity-forms
3,548
5,749
247
Shell
wp-post-frontend
1,811
16,690
294
Shell
[redacted]*
1,716
2,133
65
Shell
mdc-youtube-downloader
1,039
5,517
199
LFI
document_manager
915
4,450
148
LFI
paypal-currency-converter-basic-for-woocommerce
797
1,133
129
LFI
justified-image-grid
788
17,852
35
LFI
cherry-plugin
539
3,919
31
Shell
aspose-cloud-ebook-generator
531
720
25
LFI
gwolle-gb
331
406
46
LFI
*The redacted plugin in the list was removed before publication. It is an undocumented older shell upload vulnerability which is being targeted. The vulnerability does not exist in the current version of the plugin. Because it’s undocumented it is technically a zero day vulnerability, even though the vulnerability has been fixed in newer versions of the plugin, so we decided to remove the plugin name.
Notes
The large number of local file inclusion vulnerabilities that are being exploited is surprising. I should also note that many of these LFI’s were discovered by Larry Cashdollar who I had the pleasure of seeing speak at Defcon in Las Vegas 2 weeks ago. So I suspect that many of these are being used in an attack script of some kind which may explain their prevalence in the attacks we’re seeing.
The clustering of LFI’s together and Shell exploits together in the list order is odd, but I don’t have a theory to explain that and there is no error in the data that accounts for that. It appears to be coincidence.
The vulnerability in the Recent Backups plugin at the top of the list was disclosed in August 2015 and the plugin has now been removed from the repository, probably because it was not being maintained. The large number of exploits targeting this plugin are puzzling because as far as I can tell from archive.org, the plugin only had a few thousand installs. It may be because it is quite easy to “google dork” to find sites that are vulnerable and the abundance of target sites may make this an attractive target.
As a final note, I’d like to add that this data is simply an indication of the volume of attacks that we are seeing on plugins in the wild across the large attack surface that is WordPress websites who are protected by Wordfence. It does not give any indication of whether a plugin in this list is more or less secure than others. It does not include data on how successful attacks on the plugins shown may or may not be. It is purely an indication of attack activity in the wild on WordPress plugins during the past week.
Your comments are welcomed as always.
The post Top 50 Most Attacked WordPress Plugins This Week appeared first on Wordfence.
#WordPressSecurity #Wordfence #Research #Wordpress #Wordfence http://www.larymdesign.com


Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment