Web Designing & Development: For Affordable Web Design & Development : Mobile App Development : Visit: www.esignature.com.np

Tuesday, June 5, 2012

Wordpress Development - How Hackers Hijack WordPress Blogs -- and How to Stop Them

By -
Category - Wordpress Development
Source -http://www.msnbc.msn.com/


Wordpress Development
 Your favorite blog got hacked. Worse, it infected the computers of thousands of people who visited it.
Such a scenario played out earlier this year with the Flashback Trojan, a piece of malware that used such " drive-by downloads " to infect 600,000 Macs, mostly in English-speaking countries, that had visited corrupted blog pages. 

The Flashback outbreak got attention because it attacked rarely infected Macs. But it was also the latest in a series of security headaches for WordPress, one of the most popular blogging platforms in use. Those Macs got infected by Flashback because they'd visited WorsdPres-based blogs that had been rigged, without the knowledge of their operators, to distribute malware. 

Since it debuted in 2003, WordPress has become a favorite target of hackers and cybercriminals. That's not all the fault of its developers, and WordPress bloggers can take steps to avoid being vulnerable.
[ FAQ: The Flame/Skywiper Virus and How to Protect Yourself ] 

Open source, but open to attack
Strictly speaking, WordPress is a free, easy-to-use content-management system and blogging tool. The website WordPress.org hosts the software itself, which anyone can download and use at no charge. 

For those people who want to set up a blog but don't have much technical expertise, there's WordPress.com, a commercial hosting service similar to Google's Blogger that has both free and paid options. 

As a content-management system, WordPress is used on such high-profile sites as CNN and TechCrunch.
WordPress software offers a lot of useful features, plus the ability to run plug-ins to add even more functionality. WordPress.com’s paid users get additional features not available to the free users. 

WordPress is not only free, but also open source, which means anyone can look at the underlying programming code and create new themes (the software that gives a site or blog its "look") or plug-ins that anyone can use. 

All these aspects make WordPress very popular. The CMS tracker Builtwith estimates that it's used on at least half of all websites. That popularity makes the platform a big, juicy target for hackers and cybercriminals. 

Since anyone can make themes and plug-ins, it’s not surprising that fake or corrupted versions of those small pieces of software are the two avenues hackers usually use to attack WordPress

Anatomy of a WordPress attack
The Flashback Trojan started unsuccessfully in September 2011 as a fake Adobe Flash update targeting Mac OS X. 

By March 2012, Flashback had changed into a drive-by download using a multi-stage infection process, which was later outlined by Moscow-based security firm Kaspersky Lab. 

First, thousands of bloggers, mostly in North America or Britain, were duped into installing a free WordPress plug-in called ToolsPack, which claimed to unlock features normally available only to paid users.
ToolsPack was actually a Trojan that installed a "backdoor" on WordPress sites — a secret way in that let the creators of Flashback administer the blogs.

The second step was for the Flashback creators to install hidden links on the blogs. Those links waited for Mac browsers to visit. 

If one did, the third stage took place. The hidden links would upload a second Trojan that exploited a security hole in the Java programming language. 

That Trojan installed itself not on the blogs, but on the visiting Mac itself. It would quickly scan the Mac for anti-virus software. 

If it found none, it would activate the fourth step and download and install the core Flashback malware.
The fifth and final step was for Flashback to hijack Mac-based Web browsers’ search results and online ad links, redirecting them to sites and ads that generated money for the criminals controlling Flashback — part of a "click-fraud" or " clickjacking " scam. 


Source - http://www.msnbc.msn.com/id/47680292

No comments:

Post a Comment