2019-03-10 00:00:00

Security|TechnologyCMS|hacker|infected|malware|plugin|virus|vulnerability|Wordpress

90 percent of hacked web sites were powered by WordPress

WordPress is so popular software package for online publications, e-commerce, business sites, blogs, and all types of web sites that it has the major problem that comes with success: hackers. Sucuri, a business specialized in web site security, analyzed infected web sites that they had restored in 2018. WordPress was running on 90% of the infected sites.

Sucuri analyzed 18302 infected websites for the report where they summarize their findings. In 2018, web sites infected by malware or successfully accessed by hackers were powered by:

  • 90% of the web sites were running on WordPress
  • 4.6% Magento
  • 4.3% Joomla
  • 3.7% Drupal

Once infected, a web site is in trouble. Approximately 11% of the infected websites were marked dangerous by a blacklist authority whose listing is likely to affect negatively to Google search results.

It is fair to add that even though WordPress is the most hacked content management system, it is also – by a wide margin - the most popular system with millions of live installations.

locked door - restricted area. photo by Nguyen Nguyen.
Photo by Nguyen Nguyen.

The most common threats to WordPress and other content management systems

All content management systems, like WordPress have a similar problem that hackers are taking advantage of: third-party add-on modules, plugins, themes, and extensions are the most vulnerable element in a system.

It may take a long time before someone who has created a plugin is aware of a vulnerability, and before it is patched. Yet, open source content management systems want to provide add-on modules because they extend the functionality of the core system.

Common issues causing vulnerabilities:

  • Improper deployment of the content management system.
  • No security configuration.
  • Overall site maintenance lacking knowledgeable resources.
  • Broken authentication and session management.
  • Pirated software with backdoors and other malware.
  • Reuse of leaked passwords.
  • Cross-site contamination.

By and large, plugins with known and unknown vulnerabilities are the primary attack route affecting tens of thousands of sites a year.

Three most desired files by hackers in WordPress

Index.php, functions.php and wp-config.php files are the most popular targets for attackers. These php scripts are loaded every time a site is accessed. They belong to a group of core files in WordPress.

The common types of infections in WordPress and other web sites

Sucuri detected the following type of hacks on infected WordPress sites:

  • 68% of infected sites had a Backdoor. This is an access point to the system only known to the party who created the piece of software, such as a plugin.
  • 56.4% Malware
  • 51.3% SEO spam
  • 44.4% Non-classified
  • 18.9% Hack tool
  • 12.5% Mailer
  • 10.1% Defaced
  • 8.9% Phishing
  • 4.4% Dropper (a way to infect with a virus)
Sucuri wordpress security scan report
An extract from Sucuri WordPress security scan results.

What can a WordPress site admin do to prevent hacking?

In 2018, 36.7% of infected sites had an outdated core WordPress version. It means the majority of hacked sites had an up-to-date WordPress configuration. Although constant updating of WordPress is encouraged, regular updating is clearly not the only protection method against hackers.

Multiple types of security and firewall plugins are available for making a WordPress site less vulnerable, as well as cloud services that monitor the health of a site.

The first step is to scan a WordPress site for known vulnerabilities. Free online scanners are available that can detect common problems and vulnerabilities hackers are looking for. Wpbeginner has reviewed a number of Wordpress security scanning services. Many of these provide a subscription service that automates the scanning, and can conduct a deeper inspection inside the system.

We were worried about the status of WordPress security and privacy after December 2018 Wordcamp keynote speech State of the Word by Matt Mullenweg. He didn't even mention security or privacy during his talk. If it is a sign of strategic direction for WordPress, it is a very risky one.

The news for the report via Info Security.

News

2025-01-15 08:59:00

Not to mention travel – when real life experiences in a destination don’t match the expectations and everything that can go wrong, goes wrong. Well, that’s the beauty of #travel. #Europehttps://klaava.com/nitpickers-travel-journal-travel-lessons-learned-in-2024/


News

2025-01-11 13:25:00

A conclusion from the Traffic Scorecard 2024 results is it takes about double the time to drive along the streets of London (the most congested city in #Europe) than the streets of Munich, which is ranked the 21st most congested European city. #traffic #travelhttps://klaava.com/the-cities-in-europe-where-people-are-stuck-in-traffic-most-often/


A shop dedicated to tasty juice

2025-01-09 14:04:10

arihak

A shop dedicated to tasty juice


in the busy old town center.

2025-01-08 16:16:08

in the busy old town center.


News

2025-01-07 14:56:00

A reminder for keeping your data safe when traveling. Why? It is likely that you have to access your most critical data in risky situations on the road.https://cybernews.com/privacy/how-to-protect-your-sensitive-information-while-traveling/


News

2025-01-02 16:33:00

What about the scenery, you who are hurrying to the other side?#streetphotography#streetphoto


News

2025-01-01 16:06:00

According to a survey, third of travelers are victims of online booking scams. Since it is so convenient to make travel reservations online, that’s what we do. The problem is that we haven’t adopted new methods to avoid online scams. #travel #scamhttps://klaava.com/a-traveler-is-more-likely-to-get-scammed-when-booking-a-trip-than-being-robbed-in-a-destination/


Perhaps road builders had too much time?

2024-12-29 15:19:44

Perhaps road builders had too much time?


News

2024-12-27 18:25:00

#Photography is full of so-called “rules” that can feel overwhelming. However, some of these “rules” are downright myths.https://www.diyphotography.net/debunking-seven-common-myths-photographers-still-believe-in/


What should I read next?

2024-12-25 15:18:22

arihak

What should I read next?


News

2024-12-23 11:34:00

Since #EU #DMA has specified #Apple as a #gatekeeper in #mobile devices, EU considers Apple should implement several iOS connectivity features, predominantly used for and by connected devices. For instance, notifications, automatic Wi-Fi connection, AirPlay, AirDrop, or Bluetooth audio switching.https://digital-markets-act.ec.europa.eu/commission-seeks-feedback-measures-apple-should-take-ensure-interoperability-under-digital-markets-2024-12-19_en


News

2024-12-21 14:51:00

Smartphone users in the US are not impressed with the latest artificial intelligence features on their devices with 73 percent of Apple users and 87 percent of Samsung users unsatisfied, according to a new study. #phone #AIhttps://petapixel.com/2024/12/19/majority-of-smartphone-users-are-unimpressed-with-ai-features-study-finds/


There should be enough ice already to open the hotel

2024-12-20 16:40:17

There should be enough ice already to open the hotel


Hiking on a mountain experience: the end of an ancient tunnel

2024-12-09 14:12:31

arihak

Hiking on a mountain experience: the end of an ancient tunnel


on a hot summer day

2024-12-02 18:47:01

on a hot summer day


Cloudy day in a valley

2024-11-25 16:31:59

arihak

Cloudy day in a valley


In the shade of a lone palm tree

2024-11-25 15:46:29

In the shade of a lone palm tree


an abandoned town?

2024-11-07 18:35:22

an abandoned town?


A quiet moment between heavy rain

2024-10-24 17:34:45

A quiet moment between heavy rain


Everyone loves a pretty mountain scenery

2024-10-24 16:54:02

arihak

Everyone loves a pretty mountain scenery