Categories
Security WordPress

Reblog: Hacking Campaign Actively Exploiting Ultimate Member Plugin

Some of my behind-the-scenes work at Automattic was featured in a WPScan blog post and disclosure.

While auditing logs across Automattic’s platforms, we identified an attack campaign leveraging vulnerabilities in the Ultimate Member plugin. The plugin’s developers attempted to fix the issue in version 2.6.4 but one of our Security Researchers identified that the vulnerability was still present — even in additional attempts to patch it across versions 2.6.5 and 2.6.6.

At the time of this post, the plugin is still vulnerable to unauthenticated privilege escalation — allowing an attacker to register as an administrator.

Read more, including indicators of compromise, at https://blog.wpscan.com/hacking-campaign-actively-exploiting-ultimate-member-plugin/

While you’re on WPScan or Jetpack.com, you might find other articles about some of my random work — such as The School Management plugin backdoor disclosure and Fake Plugin Wave Affecting WordPress sites.

Categories
Investigations Security WordPress

Reblog: Fake plugin wave affecting WordPress sites

Bad actors are abusing leaked and compromised credentials to install the fake core-stab plugin and other items on WordPress sites.

Fake plugin wave affecting WordPress sites — Jetpack

Some of my behind-the-scenes work at Automattic was featured in a recent Jetpack & WPScan blog post.

The WPScan version of the post includes a bit more about the malware, indicators, as well as Yara & ModSec rules.

Read more on Jetpack.com and WPScan.com.

While you’re on Jetpack.com, you might find other articles about some of my random work — such as The School Management plugin backdoor disclosure.