标题 | 简介 | 类型 | 公开时间 | ||||||||||
|
|||||||||||||
|
|||||||||||||
详情 | |||||||||||||
[SAFE-ID: JIWO-2025-761] 作者: 枫叶 发表于: [2017-09-30]
本文共 [722] 位读者顶过
A cyber-criminal has hidden the code for a PHP backdoor inside the source code of a WordPress plugin masquerading as a security tool named "X-WP-SPAM-SHIELD-PRO." The attacker was obviously trying to leverage on the reputation of a legitimate and highly popular WordPress plugin called "WP-SpamShield Anti-Spam," a popular anti-spam tool for self-hosted WordPress sites. Instead, users who downloaded X-WP-SPAM-SHIELD-PRO got a nasty surprise in the form of a backdoor that allowed the attacker to create his own admin account on the site, upload files on the victim's servers, disable all plugins, and more. Security-focused plugin delivers nasty backdoorAll of the malicious behavior was spread across the fake plugin's files. For example:
class-social-facebook.php - poses as a social media spam protection tool, but the code found within sends a list of the user's plugin list to the attacker and optionally disables all plugins. The reason to disable all plugins is to shut down any other security-focused plugins that block access to login functions or would detect the hacker's unauthorized logins.[出自:jiwo.org]
class-term-metabox-formatter.php - sends the user's WordPress version to the attacker. class-admin-user-profile.php - sends a list of all WordPress admin users to the attacker. plugin-header.php - adds an additional admin user named mw01main. wp-spam-shield-pro.php - pings the hacker's server located at mainwall.org, letting the attacker know when a new user installed the fake plugin. The data this file sends over includes user, password, infected site URL, and server IP address. This latter file also includes code to allow the attacker to upload a ZIP archive on the victim's site, unzip it, and then run the files within. At the time security researchers found the malicious plugin, the ZIP file offered for download was corrupted, but experts believe the attacker was deploying a tainted version of the well-known All In One SEO Pack WordPress plugin. Be careful what you're installing on your WP siteAccording to Sucuri, the cyber-security company that discovered X-WP-SPAM-SHIELD-PRO, the plugin never made it on the official WordPress Plugins repository, being made available through other sources. Overall, the plugin lures users worrying about their site's security, but in reality, it's their downfall. |