Sunday 1 October 2017

Malicious Code in Previously Trusted WordPress Plugins: A New Reality


In case you missed it, three widely-used WordPress plugins were recently found to have malicious code included with recent updates. Display Widgets, Fast Secure Contact Form and SI CAPTCHA Anti-Spam were each removed from the official WordPress Plugin Repository due to SEO spam discovered by users. One thing each plugin has in common was that they were all previously trusted and generally considered secure. More recently, they were sold by their original authors to a new developer, who used these popular plugins to spread payday loan spam posts. In fact, security plugin company Wordfence recently reported that up to 9 plugins have been found with malicious code added through various means.
While many web designers and developers have become more proactive in securing their sites against typical threats like brute force attacks, etc. – malicious plugins appear to be a whole new ballgame. We’re used to defending against security holes, but not authors who are intentionally trying to propagate malware. And in the case of the plugins mentioned above, immediately updating to the latest version was the worst thing we could have done since that was how the code was installed.
The
Source: https://managewp.org/articles/16214/malicious-code-in-previously-trusted-wordpress-plugins-a-new-reality




source https://williechiu40.wordpress.com/2017/10/01/malicious-code-in-previously-trusted-wordpress-plugins-a-new-reality/

No comments:

Post a Comment