This Week’s Top 20 Attacked Themes and Who is Attacking Them
Today we’re publishing statistics on the attacks we are seeing on themes across the WordPress ecosystem. The Wordfence Firewall provides us with attack telemetry across a large number of sites that we protect. The data we’re sharing today is based on the following high level metrics:
- An analysis of 15,949,826 total attacks across the past 7 days – from Monday August 1st to Monday August 8th (yesterday) on sites that Wordfence protects.
- Attacks on 519,592 unique Wordfence customer websites.
- Attacks originating from a total of 72,896 unique IPs.
The “Theme Slug” below is a term used in WordPress parlance. It refers to the unique directory name that is created in the wp-content/themes/ directory for the theme when it is installed. This uniquely identifies themes in the WordPress ecosystem. To find out more about the theme, simply Google the ‘slug’.
The table shows the total attacks we recorded on that theme across all sites, the number of IPs that launched an attack on the theme and the number of unique sites that we recorded attacks for that targeted that theme. To be clear, that is not the number of sites actually running the theme. It’s simply the number of sites where someone tried to attack the theme, whether it was installed or not.
We explain why most of these themes are being attacked and what the “Bulk Disclosed” column means below the table.
|Theme Slug||Total attacks||Unique IPs attacking||Unique sites attacked||Vulnerability Type||Bulk Disclosed|
Who is attacking these themes?
Back in December, 2014 a researcher bulk disclosed a large number of WordPress theme vulnerabilities. The disclosure includes a script that targets a single site and tries to exploit vulnerabilities in a large number of themes. The vulnerabilities it tries to exploit are all file inclusion vulnerabilities.
In the comments at the top of the script that was disclosed, the researcher also includes an example of how to use the script with the powerful INURLBR scanner which he also wrote. This allows attackers and presumably other researchers to bulk find and exploit WordPress sites by trying to exploit the theme vulnerabilities disclosed.
This is the example included in the disclosure:
./inurlbr.php --dork 'inurl:/wp-content/themes/' -q 1,6 -s save.txt \ --comand-all "php exploit.php _TARGET_"
In the statistics we’ve released above, all the themes marked with an X are included in the bulk disclosure that was made and which included the inurlbr exploit example. So we think what is happening is that so called “script kiddies” (unsophisticated hackers) are grabbing the researcher’s original example from December 2014 and trying to exploit old vulnerabilities in themes.
All these exploits are being blocked by the Wordfence firewall. It’s also likely that many, possibly all of the themes have now fixed this vulnerability, although we recommend that if you use any of these themes you verify with your vendor that your current version contains no vulnerabilities.
The INURLBR scanner has evolved since it was first released in July 2014 into a powerful tool that allows attackers to bulk locate and exploit WordPress websites and sites using other CMSs. The scanner includes:
- Support for a huge range of search engines to “Google dork” and find targets for attack.
- Bulk exploiting of targets once found.
- The ability to use proxies to hide where queries and exploits are coming from.
- The ability to rotate proxies to constantly change IP.
- Ability to hide behind Tor.
- It can send vulnerable sites to an IRC channel, presumably for botnet integration.
- It includes many other features like regex matching/extraction and more.
It’s possible that many users of INURLBR are using the original bulk disclosure to test INURLBR before launching more sophisticated attacks. That may explain why those original themes are dominating our top 20 list of exploited themes.
At Wordfence we constantly mine attack data to discover how to better protect our customers. Upgrade to Wordfence Premium today to receive real-time firewall rule updates, premium support and much more.
We encourage you to comment and share this data with the larger WordPress community.