WordPress Sites Hijacked for Widescale Brute Force Campaign

by | Mar 7, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A wave of widescale attacks targeting WordPress sites has emerged, with hackers exploiting vulnerabilities to inject scripts that harness visitors’ browsers for large-scale brute force attacks on other websites.

Initiated by a threat actor previously associated with injecting crypto wallet drainer scripts, this campaign has caught the attention of cybersecurity firm Sucuri. The attacker’s modus operandi involves compromising WordPress sites to inject the AngelDrainer wallet drainer script initially. However, in a recent shift, they’ve redirected their efforts towards coercing visitors’ browsers into launching brute force attacks on other WordPress sites.

Brute force attacks entail repeated login attempts with varied passwords to gain unauthorized access. By compromising WordPress sites, threat actors implant malicious code into HTML templates. Upon visiting these compromised sites, visitors unwittingly load scripts from ‘https://dynamic-linx[.]com/chx.js‘ into their browsers.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

These scripts surreptitiously communicate with the attacker’s server at ‘https://dynamic-linx[.]com/getTask.php,’ receiving tasks in the form of JSON files outlining parameters for the brute force attack. Tasks include website URLs, account names, password batches, and instructions for the browser to upload files containing potential login credentials to the compromised WordPress sites.

Example bruteforce JSON taskExample bruteforce JSON task
Source: BleepingComputer

After receiving the task, the script initiates a process where the visitor’s browser discreetly uploads a file via the WordPress site’s XMLRPC interface, utilizing the account credentials provided in the JSON data.

Upon successful authentication, the script alerts the malicious actor’s server about the discovered password for the site. Subsequently, the hacker gains access to the site to retrieve the uploaded file, which contains the base64 encoded username and password combination.

Script causing browser to bruteforce a website's credentialsScript causing browser to bruteforce a website’s credentials
Source: BleepingComputer

Sucuri’s investigation reveals over 1,700 compromised sites harboring these malicious scripts, indicating a significant threat to WordPress security. Notably, Germán Fernández from CronUp discovered Ecuador’s Association of Private Banks’ website compromised, acting as a vector for unsuspecting visitors.

While the motive behind the shift from crypto wallet drainers to brute force attacks remains unclear, Sucuri suggests the change could be driven by the desire to expand the attacker’s portfolio for future monetization endeavors.




Denis Sinegubko of Sucuri posits that the previous method may have drawn unwanted attention and led to swift domain blocks, prompting the adoption of stealthier tactics.

As the threat landscape evolves, vigilance and prompt security measures are imperative to thwart such sophisticated attacks targeting WordPress and its vast user base.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This