How serious are the WordPress Malware Attacks?

According to the WordCamp site, there are currently over 75 million sites that use WordPress. While no one actually has the actual number of attacks. The WordFence plugin has been downloaded over 180 million times and protects 4 million WordPress websites.

WordFence reported their customers experience 2800 malicious login attempts per second. WordFence analysis accounts for a very small portion of the WordPress user base.

If malicious attacks rates are consistent. The WordPress platform could easily have 50,000 attacks per-second.

The likelihood of the attacks being consistent is slim. Hackers are smart people. They know that attacking a WordPress site without Security is easier to access than one with Security. Attacks on systems without security is more prevalent.

Website Hacker

“2,800 malicious login attempts per second against WordFence customers” – WordFence

Your Friend Got Your Site Hacked

2021 WordPress Hacks

Shared Hosting Vulnerability 

FINALLY – Sucuri has reported (what I have been telling my clients for years). Shared Hosting requires that all sites are up-to-date. Hackers are able to access a website via the cPanel by first accessing a known vulnerable site on the cPanel hosting. 

For more information on Share Hosting Infections read – Trojan Spyware and Bec Attacks (if you are not techinal jump to the article conclusion).

Shared Hosting Hack

Keep All Sites Current to Avoid Shared Hosting Hack.

2021 WordPress Plugin Attacks

Facebook for WordPress Plugin

Two critical severity flaws in Facebook for WordPress (formerly Facebook Pixel). The first flaw allowed hackers to achieve remote code execution.

The second flaw simply had to trick the admin user to click a link and the hackers could inject malicious code into the site.

jQuery Migrate Plugin

The full scale of attack remains undetermined. By injecting Scripts hackers can skim credit card info. And, redirect users to fake sites.

Users were redirected to fake sites. And, prompted to confirm they were not a robot. As of March 2021, the malicious file is undetected by 90% of antivirus engines.

Elementor  Plugin

Compromise the admin accounts. Then using the site to install malicious plugin wpstaff.

Orbit Fox Plugin

Inject malicious code into vulnerable website. And take over the website. 

Popup Builder Plugin

Attackers send out newsletter with their own custom content. Followed by deleting your entire contact list. Let Mailchimp handle your newsletter services. 

123ContactForms Plugin

Sucuri reported the 123ContactForms hack. Attackers are able to use software flaws to create their own posts. And, easily add malicious files to the website.

Contact Form 7 Plugin

Stored cross-site scripting (xss) security bug. 

Ninja Forms Plugin

Critical security Flaws January 2021 & June 2020. 

BUG 1: Authenticated Email Hijacking Account Takeover.

Attacker with subscriber-level access (the lowest access available to WordPress users). 

Bug 2: Authenticated OAuth Connection Key Disclosure.
Bug 3: Cross-Site Request Forgery to OAuth Service Disconnection.
Bug 4: Administrator Open Redirect.

2020 WordPress Plugin Attacks

Easy WP SMTP Plugin

Hackers were able to identify admin users. Followed by a password reset. Locking the admin user out. And, giving the hacker full control to all site functions and user accounts.

Loginizer Plugin

WordPress developers categorized the security issues affecting the plugin and one-of-the-worst.

WordPress developers pushed an automatic update to all users (even those that had the plugin disabled).

The forced update was the first indicator that WordPress has the ability to automatically update everyone’s plugins – even when they are not active.

NextGEN Gallery Plugin

Here are articles to learn more about the NextGen Plugin hack.

Over 530,000 sites are still exposed to attackers. Yes, NextGen Gallery got hit by another hacker. This time, using Remote Code Execution to effectively take over the WordPress site.

NextGEN Gallery acted quickly to provide a patch for the hack. A few days after the release only a small portion of the GalleryGen Gallery plugin had updated to the safe version of the plugin. Leaving more than 530,000 potentially exposed to takeover attacks.

In 2017, NextGen Gallery was attacked with a SQL injection.  Allowing hackers access to the website database. Including sensitive user information.

Ninja Forms Plugin

Threat Intelligence team reported a XSS flaw in Ninja Forms. The plugin flaw let attackers replace contact forms with a malicious form.

Learn More About WordPress

Read my most recent WordPress Blogs.

WordPress – The Year Ahead

WordPress – The Year Ahead

BY GARY CROSSEY

Minutes – Sandy Mush WordPress Meeting #005 Tuesday, 26th January…read more

WordPress and PWA

WordPress and PWA

BY GARY CROSSEY

WordPress and Progressive Web Apps (PWA) Progressive Web Apps…read more

The Impact of WordPress Plugins

The Impact of WordPress Plugins

BY GARY CROSSEY

What is the Impact of WordPress Plugins What is the real impact of…read moreREAD MY BLOG – The Impact of WordPress Plugins

Read my blog to learn more about The Impact of Using WordPress Plugins

Article Updates

  • 2/18/21 – Added second NextGEN Gallery WordPress plugin article link.
  • 2/25/21 – Added second Ninja Forms WordPress Plugin hacked.
  • 3/3/21 – Updated Ninja Forms Bug 3.
  • 3/16/21 – Page Layout Redesign. More information at the bottom of page.
  • 3/16/21 – Added new listing. Contact Form 7, Elementor, Popup Builder, and Orbit Fox.
  • 4/8/21 – Added jQuery Migrate plugin.