Wordfence analysts report having detected a massive wave of attacks in the last couple of days, originating from 16,000 IPs and targeting over 1.6 million WordPress sites.
The threat actors target four WordPress plugins and fifteen Epsilon Framework themes, one of which has no available patch.
Some of the targeted plugins were patched all the way back in 2018, while others had their vulnerabilities addressed as recently as this week.
- PublishPress Capabilities
- Kiwi Social Plugin
- Pinterest Automatic
- WordPress Automatic
The targeted Epsilon Framework themes are:
- Newspaper X
- Pixova Lite
- MedZone Lite
- Regina Lite
- NatureMag Lite – No patch available
"This makes it possible for attackers to register on any site as an administrator effectively taking over the site."
Check, update, clean
To check if your site has already been compromised, you can review all user accounts and look for any rogue additions that should be removed immediately.
Next, review the site's settings at "http://examplesite[.]com/wp-admin/options-general.php" and pay attention to the Membership and the new user default role setting.
Note that updating the plugins won't eliminate the threat if your site has already been compromised. In this case, you are advised to follow the instructions found in detailed clean-up guides first.
In general, try to keep the number of plugins at your WordPress site to the absolute minimum necessary as this dramatically reduces the chances of being targeted and hacked in the first place.