3 min read

Golang Bot Starts Targeting WordPress Websites

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Golang Bot Starts Targeting WordPress Websites

Bitdefender researchers have identified a new version of an already-known vulnerability scanner that looks for a specific flaw in the “Ultimate GDPR & CCPA Compliance Toolkit” plugin for WordPress.

Zero-day vulnerabilities get all the attention, but n-day vulnerabilities cause most security issues. These flaws are already known, and many already have patches. The problem is that people and companies don’t patch their systems or software, giving attackers a way in.

Bitdefender security researchers found a new version of an already-known vulnerability scanner. The bot, written in Golang, targets the “Ultimate GDPR & CCPA Compliance Toolkit” plugin for WordPress. This particular plugin has a critical vulnerability that lets attackers redirect traffic to a malicious website.

Why WordPress plugins?

WordPress, the largest platform of its kind, uses countless plugins. Its modularity allowed it to grow, but it’s also a reason threat actors target it often. Vulnerable and unpatched plugins pose a serious security problem, creating a gold mine for criminals.

The “Ultimate GDPR & CCPA Compliance Toolkit” lets websites adhere to the strict rules of The General Data Protection Regulation in Europe. Failure to comply with this regulation exposes website owners to huge fines. If they want European visitors, they need something in place to deal with the data collected from them.

When researchers found the vulnerability in the “Ultimate GDPR & CCPA Compliance Toolkit,” the plugin had around 6,000 sales. Anyone using version 2.4 or lower was exposed to this vulnerability. The developer team fixed the issue on January 28, 2021, bringing us full circle to the n-day vulnerabilities. Simply put, if the websites using this plugin haven’t upgraded, they are prone to attacks.

How does it work?

The bot retrieves the front page of the web service and looks for certain strings. These correspond to attacker-controlled domains; their presence indicates that the target has already been compromised. Otherwise, subsequent checks show whether the target uses the vulnerable WordPress plugin, in which case the exploit is launched.

The following excerpt from the main.make_ct_ultimate_gdpr function shows the validation performed prior to launching the exploit:

Attacker-controlled domains:

  • travelfornamewalking[.]ga
  • lovegreenpencils[.]ga
  • linetoadsactive[.]ga
  • lowerthenskyactive[.]ga
  • transandfiestas[.]ga
  • strongcapitalads[.]ga
  • talkingaboutfirms[.]ga
  • daryinformtrand[.]com
  • dontkinhooot[.]tw
  • declarebusinessgroup[.]ga

As described in the advisory, the vulnerability lets the attacker overwrite the settings file. The JSON file containing the new settings is not bundled in the malware, being retrieved from the filesystem (“cc4.json”).

In previous campaigns by this threat actor, the chain through which a WordPress instance is compromised was leading visitors to malicious pages:

Typical exploit flow in previous campaigns

⦁ the bot queries the C2 for a target domain
⦁ the bot scans the target for vulnerabilities and sends reports to the C2
⦁ in some cases, the bot launches the exploit, compromising the target by injecting data
⦁ visitors of the target site execute the attacker-supplied script and are redirected to a malicious website

For example, the actor injects an external script into the index page (sample: d492dd3608741c9128eb5a8dfc1ae688b63bfe8daf9ecaa3ca784aa654a92ef8):

The chain of redirects that leads the visitor from the initial injected script to the malicious website can be easily followed:

This time, the vulnerability enables the attacker to reach the same goal without extra steps.

Based on previous campaigns from the same threat actor, we can assert that its likely goal remains the same, to infect websites and redirect visitors to malicious pages.

Fortunately, a few indicators of compromise can help us identify it more easily.

IOCs

Hashes:

b8aa5b2d7a9febcbca31a6efd3327319c2efe4857e082e65f1333caf65b4f3be (scanner bot)
4277afc7be775bdad3b7c1be0e793401f79136c120cb667c00b55bec2d23a07e (scanner bot)
15117f2d1783063f26c58d1c0ea755d952facbf12e7fd8efc077a0a2780e5906 (archive)
d492dd3608741c9128eb5a8dfc1ae688b63bfe8daf9ecaa3ca784aa654a92ef8 (script)

Network indicators:

  • lovegreenpencils[.[ga
  • travelfornamewalking[.]ga
  • linetoadsactive[.]ga
  • lowerthenskyactive[.]ga
  • transandfiestas[.]ga
  • strongcapitalads[.]ga
  • talkingaboutfirms[.]ga
  • daryinformtrand[.]com
  • dontkinhooot[.]tw
  • declarebusinessgroup[.]ga
  • 195.2.71.173:4112

tags


Author



Right now

Top posts

BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign

BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign

December 06, 2022

1 min read
Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild

Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild

October 05, 2022

1 min read
A Red Team Perspective on the Device42 Asset Management Appliance

A Red Team Perspective on the Device42 Asset Management Appliance

August 10, 2022

1 min read
Vulnerabilities Identified in Wyze Cam IoT Device

Vulnerabilities Identified in Wyze Cam IoT Device

March 29, 2022

1 min read
New FluBot and TeaBot Global Malware Campaigns Discovered

New FluBot and TeaBot Global Malware Campaigns Discovered

January 26, 2022

10 min read
Bitdefender Honeypots Signal Active Log4Shell 0-Day Attacks Underway; Patch Immediately

Bitdefender Honeypots Signal Active Log4Shell 0-Day Attacks Underway; Patch Immediately

December 10, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

SMS Scams Exposed: A Look at Ongoing Campaigns Worldwide SMS Scams Exposed: A Look at Ongoing Campaigns Worldwide
Alexandra BOCEREGAndrei GHINEAMarius TIVADARSilviu STAHIE
15 min read
Real-Time Behavior-Based Detection on Android Reveals Dozens of Malicious Apps on Google Play Store Real-Time Behavior-Based Detection on Android Reveals Dozens of Malicious Apps on Google Play Store
Alexandra BOCEREGRăzvan GOSAAlbert ENDRE-LASZLOAlex BACIUSilviu STAHIE
7 min read
RIG Exploit Kit Swaps Dead Raccoon with Dridex RIG Exploit Kit Swaps Dead Raccoon with Dridex
Mihai NEAGUGeorge MIHALI
1 min read