Despite only having an estimated install count of roughly 30,000 sites, nearly 60% of which should now be running a patched version of the plugin, over 2.8 million sites protected by Wordfence have been targeted by this campaign since April 8, 2021. It is likely that these numbers are reflected by the larger WordPress ecosystem as a whole and that millions of sites that are not protected by Wordfence are also being attacked.
The original vulnerability was already being actively attacked when it was reported by hosting company Seravo, making it a 0-day at the time. This vulnerability allowed attackers to login as an administrator or to create new administrative accounts on any site with the plugin installed. While analyzing the plugin, the Wordfence Threat Intelligence team found additional vulnerabilities and notified the plugin’s developer. A firewall rule protecting against these vulnerabilities was released to our premium users on March 8, 2021, and became available to free users on April 7, 2021.
These attacks are part of a broader pattern we’ve seen of attacks ramping up during the spring. The vast majority of recent attacks appear to be brute force campaigns or campaigns targeting older vulnerabilities. The second most widespread attack campaign in the past week is targeting a vulnerability in Slider Revolution that was patched in 2014, as well as a few more attempts to extract sensitive information from website wp-config.php files. More and more recent attacks appear to be unfocused, which may indicate that the infrastructure used to perform attacks has become less expensive for attackers to operate.
This campaign is notable in that it is targeting a recent vulnerability and, therefore, has a higher chance of success than the other campaigns we’ve seen recently. We estimate that at least 10,000 sites are still vulnerable. It is also unusual in that it is a set of sustained attacks, whereas attack spikes we’ve seen in the past have typically only lasted a few days before subsiding. This may indicate that attackers are maintaining control of the hosts used to perform attacks for longer, or they are less worried about maintaining a low profile.
Indicators of Compromise
We have been closely monitoring the attack data associated with the ongoing campaign along with monitoring our site cleanings that come in as a result of this vulnerability. If your site has been compromised, and you know you have the plugin installed, the following are some of the common indicators of compromise that we are seeing.
Common Email Addresses used for Registration
email@example.com – Nearly all of the attempts we’ve seen are using this email address for newly generated admin users. We have blocked over 14 million attempts to register with this email address while attempting to exploit the vulnerability.
Top IP Addresses we have blocked trying to exploit these vulnerabilities
These attacks have been surprisingly concentrated, with only 38 IP addresses collectively responsible for the majority of the attacks. Each of the following IP addresses have attacked more than 10,000 sites on our network.
Domain Names we have found injected in infected site databases.
Common Malicious plugins we are seeing installed.
Please note that you may not be able to see these installed plugins listed on the plugin page as they may include code that hides them from your site’s wp-admin dashboard. It is important you check for the presence of these plugins by accessing your sites file system under the /wp-content/plugins directory.
What Should You Do
If you haven’t already updated The Plus Addons for Elementor Pro, then we highly recommend doing that immediately to ensure your site is protected from compromise.
If your site has been compromised due to this vulnerability then you have a few options to restore your site.
Option #1: Restore from Backup
This is the simplest way to restore your site if it has been compromised. By reviewing your site’s logs and Wordfence Live Traffic, you may be able to determine the initial date and time of the infection. Once you have determined the initial date and time of the infection, you will want to choose a back-up that is older than the time of infection.
If you are unable to determine the initial date of compromise to choose a viable back-up to restore from, then we recommend restoring your site from that back-up older than March 1st, 2021. Once you have restored your site from the back-up, then run a high sensitivity Wordfence scan to verify that no remnants of malware remains on your site. In addition, once you have finished restoring from a back-up, be sure to update all of your plugins and themes immediately after restoring a clean copy so that your site doesn’t get reinfected by the same vulnerability.
Option #2: Manually conduct the cleaning of your site
If you do not have a back-up of your site, then you may need to manually conduct the site cleaning yourself.
We covered how to clean a site that has been compromised by The Plus Addons Elementor hack on Wordfence Live, Tuesday March 16th. You can watch this video for a step by step guide to recover your WordPress site.
Option #3 Hire a Professional
If you do not feel comfortable conducting the site cleaning on your own, or have the ability to restore from a back-up, then that is perfectly okay. In that case, we recommend hiring a professional to conduct the site cleaning. Wordfence offers an excellent site cleaning service for $490 that includes a free year of Wordfence premium to enhance the protection of your site. You can learn more about that service here.
In today’s post, we covered an ongoing attack campaign against a set of critical vulnerabilities in The Plus Addons for Elementor Pro. These vulnerabilities were patched in version 4.1.7, and all sites running Wordfence, including the free version, are protected against these attacks. Nonetheless we urge you to update this plugin if you have it installed on your site, and to reach out to any friends or colleagues that may be using this plugin as this vulnerability is being actively attacked and can be used to completely take over a site with minimal effort on the attacker’s part.
Special Thanks to Threat Analyst Chloe Chamberland for her help writing and providing data for this article.