How to Protect Yourself from the Latest WordPress Malware Attack
As one of the most popular website building tools in the world, WordPress has once again become a target for malware. While security researchers are still trying to figure out how certain sites are getting infected, there are ways to check if your WordPress site is one of the victims and protect yourself against any future attacks.
WordPress website may have some malicious code
A team of security researchers from c/side, a cybersecurity firm, reported that 5,000 WordPress websites were targeted in a recent malware campaign. According to a report on the c/side blog, a malicious domain called WP3.XYZ is being 'used to expose sensitive data, including administrator credentials and activity status ,' and allows the attackers to create unauthorized admin users. Those fake admins can then download dangerous WordPress plugins onto the vulnerable sites.
The good news is, acting as unauthorized admin accounts can be detected in the code, allowing you to review your site and remove them, along with any mysterious plugins.
How to check if a website is infected with malware and is protected
If you have a WordPress site, you should check your site's security using one of the following resources:
- PublicWWW.com
- URLScan.io
If vulnerabilities are highlighted, you should log into your WordPress account to remove unused, suspicious plugins as well as unauthorized admins.
Whether or not your site has been hit by the latest malware, you should still take steps to protect your WordPress site. For this attack, you can quickly implement protection by blocking the following domains in your firewall or security tool:
https://wp3[.]xyz
In addition to blocking malicious domains like these, you can also set up multi-factor authentication (MFA) for your account. Finally, you can add or double-check that you have protection against Cross-Site Request Forgery (CSRF) attacks.
The team at c/side is still investigating the source of the malicious scripts, so we don't know exactly where the vulnerability lies. However, third-party plugins and poorly built website themes are often sources of malware. For this reason, you should check the source of your plugins to make sure they are well-reviewed and trustworthy.
Cyber-attacks, website hacks and phishing attacks are unfortunate realities of the digital age and it's important to stay vigilant, even if you'd rather leave your website alone while you focus on other areas of your business or personal life.
You should read it
- More than 100,000 pages using Wordpress are infected with malware
- Why is WordPress free?
- 5 mistakes everyone mistakenly thinks about WordPress
- Which platform is better for WordPress.com and WordPress.org?
- Modular Malware - New stealth attack method to steal data
- How to add new posts on WordPress
- How many types of malware do you know and how to prevent them?
- What's new in WordPress 5.4?
- What is Malware? What kind of attack is Malware?
- 390,000 WordPress Accounts Stolen in Large-Scale Attack
- WordPress plugins with more than 300,000 pages that use vulnerabilities are vulnerable to SQL Injection attacks
- Assign SSL security mechanism to WordPress blog
May be interested
How will RedNote replace TikTok?
NVMe PCIe 5.0 DRAM-less SSD launched at extremely attractive price
Using the 'Sign In With Google' option is risky and there is currently no workaround
Instructions to fix Excel column/row freezing not working
8 reasons not to buy external camera lenses for smartphones
FBI 'eliminates' malware that affected 2.5 million PCs