Article Details

Scrape Timestamp (UTC): 2024-01-15 07:51:25.106

Source: https://thehackernews.com/2024/01/balada-injector-infects-over-7100.html

Original Article Text

Click to Toggle View

Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability. Thousands of WordPress sites using a vulnerable version of the Popup Builder plugin have been compromised with a malware called Balada Injector. First documented by Doctor Web in January 2023, the campaign takes place in a series of periodic attack waves, weaponizing security flaws WordPress plugins to inject backdoor designed to redirect visitors of infected sites to bogus tech support pages, fraudulent lottery wins, and push notification scams. Subsequent findings unearthed by Sucuri have revealed the massive scale of the operation, which is said to have been active since 2017 and infiltrated no less than 1 million sites since then. The GoDaddy-owned website security company, which detected the latest Balada Injector activity on December 13, 2023, said it identified the injections on over 7,100 sites. These attacks take advantage of a high-severity flaw in Popup Builder (CVE-2023-6000, CVSS score: 8.8) – a plugin with more than 200,000 active installs – that was publicly disclosed by WPScan a day before. The issue was addressed in version 4.2.3. "When successfully exploited, this vulnerability may let attackers perform any action the logged‑in administrator they targeted is allowed to do on the targeted site, including installing arbitrary plugins, and creating new rogue Administrator users," WPScan researcher Marc Montpas said. The ultimate goal of the campaign is to insert a malicious JavaScript file hosted on specialcraftbox[.]com and use it to take control of the website and load additional JavaScript in order to facilitate malicious redirects. Furthermore, the threat actors behind Balada Injector are known to establish persistent control over compromised sites by uploading backdoors, adding malicious plugins, and creating rogue blog administrators. This is often accomplished by using the JavaScript injections to specifically target logged-in site administrators. "The idea is when a blog administrator logs into a website, their browser contains cookies that allow them to do all their administrative tasks without having to authenticate themselves on every new page," Sucuri researcher Denis Sinegubko noted last year. "So, if their browser loads a script that tries to emulate administrator activity, it will be able to do almost anything that can be done via the WordPress admin interface." The new wave is no exception in that if logged-in admin cookies are detected, it weaponizes the elevated privileges to install and activate a rogue backdoor plugin ("wp-felody.php" or "Wp Felody") so as to fetch a second-stage payload from the aforementioned domain. The payload, another backdoor, is saved under the name "sasas" to the directory where temporary files are stored, and is then executed and deleted from disk. "It checks up to three levels above the current directory, looking for the root directory of the current site and any other sites that may share the same server account," Sinegubko said. "Then, in the detected site root directories, it modifies the wp-blog-header.php file to inject the same Balada JavaScript malware as was originally injected via the Popup Builder vulnerability." Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and How to Mitigate Them. Firewalls vs. Zero Trust: Minimize Your Attack Surface Learn latest trends in the attack landscape, attacker strategies, and how to implement Zero Trust Security.

Daily Brief Summary

MALWARE // Thousands of WordPress Sites Hacked via Plugin Flaw by Balada Injector

The malware Balada Injector has compromised over 7,100 WordPress sites by exploiting vulnerabilities in the Popup Builder plugin.

Doctor Web initially documented the malware in January 2023, with waves of attacks dating back to 2017, impacting more than 1 million sites.

The malware redirects visitors to fraudulent tech support, lottery scams, and unwanted push notifications.

The campaign utilizes a significant security flaw in Popup Builder, CVE-2023-6000, which was patched in version 4.2.3 following WPScan's disclosure.

Attackers have established persistent access to affected sites by injecting malicious JavaScript, creating rogue admin users, and uploading backdoors.

Upon detection of admin cookies, the malware uses the privileges to install a backdoor plugin, trigger a second-stage payload, and spread the infection to other directories.

Security companies recommend updating the vulnerable plugin and stress the importance of monitoring potential security weaknesses in WordPress extensions.