Password thieves target blogs, content management sites


Today's Best Tech Deals

Picked by PCWorld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

Brute force attacks to pry login credentials from content management sites like blogs have been growing as more data robbers use a short-term gain for a bigger payoff later on.

Such sites are attractive targets because they tend to be less secure than other environments—such as financial services—and since they're interactive by design, "drive-by" malware planted on them can infect a lot of users quickly, said David Britton, vice president of industry solutions at 41st Parameter.

"With these types of interactive sites being compromised, we see more evidence of the developing attack trend that is focusing less on direct financial gain and more on gathering more detailed personal data, allowing fraudsters to build much more complex social engineering attacks that result in an eventual larger payoff," he said via email.

More and more attackers are realizing that websites built on CMS platforms, like WordPress, are ripe for password picking. "This marks a sea change in attackers targeting the low-hanging fruit of these blog systems," Matt Bing, a research analyst with Arbor Networks, said in an interview.

One such brute force campaign was identified last week by Bing. Dubbed "Disco Fort" by the researcher, it's using 25,000 infected Windows machines to support attacks on more than 6000 Joomla, WordPress, and Datalife Engine sites.

Easy passwords, easy pickings

What attackers are finding is that login credentials for many sites running popular CMS systems are easy to steal. "The common passwords that were used to successfully compromise sites were nothing very sophisticated," Bing said.

Of the more than 6000 sites compromised by the campaign, the top ten passwords used to crack them were "admin," "123456," "123123," 12345," {domain}, "pass," "123456789," "1234 150," "abc123" and "123321."

Brute force may be overstating what campaigns like Disco Fort are doing, since performing billions of computations in order crack these sites' passwords isn't in the attackers' game plan. In fact, they can crack many of these sites with very few CPU cycles.

"You can find files on the Internet of the 100,000 most commonly used passwords that can crack more than 95 percent of accounts," Girish Wadhwani, a product manager at Nok Nok Labs, said in an interview.

Once Disco Fort compromises a site, it places "backdoor" software on it so its operator can upload and download files and execute commands.

In a number of cases, the attacker installed tools that could be used to activate a drive-by exploit kit. However, no evidence was found that the tools were ever used.

How the attacker is recruiting PCs for a botnet army is also a mystery at this point. "The best evidence we have is that social engineering is being used," Bing said. "We found an executable that was the name of a book in Russian—Michael Lewis' "The Big Short: Inside The Doomsday Machine"—so it may have been trying to use that to trick users into installing the malware."

Shared vulnerabilities targeted

The widespread use of off-the-shelf CMS systems has attracted attackers' attention because if they have an unknown vulnerability for one of them in their pocket, it can be used to compromise many websites.

"Hackers are always looking to get the most profit for the least work," Barry Shteiman, a senior security strategist at Imperva, said an interview. "With these CMS systems, they can do their work once and then hack many, many sites."

Many of CMS systems, like WordPress, are easy to use. That's a good thing for users, but it's not so good for site security. "The biggest issue with WordPress is that its users are not always the most technically savvy," Michael Sutton, vice president of security research at Zscaler, said in an email.

"WordPress is designed to be fairly easy and straightforward to install," he continued, "so security is an afterthought for many of its users."

In addition, many bloggers and other CMS users aren't concerned about someone breaking into their Web locale because they believe they don't have anything worth stealing. That may be true, but it doesn't mean they don't have something valuable to hackers.

"What they don't realize is that hacking into a website has become all about distributing malware," Marc Gaffan, founder of Incapsula, said in an interview. "If you have a lot of people coming to your website, it's a great place to infect your visitors."

This story, "Password thieves target blogs, content management sites" was originally published by CSO.

Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read our affiliate link policy for more details.
Shop Tech Products at Amazon