03 Sep Malicious WordPress Redirect Campaign Attacking Several Plugins
Over the past few weeks, WordFence have reported an active attack targeting a selection of new and old WordPress Plugin Vulnerabilities. these attacks see to maliciously redirect traffic from victims website to a number of potentially harmful locations.
Today we assisted a company that was a target of this Malicious Redirect Campain. It shows while you think it might not happen to you, the chances are still quite high. They are not targetting ‘you’ they are just trying to scan the web for loop holds to add their redirects. This particular case redirected ALL links to another website, including the backend login link.
Current Plugins that have been targeted:
- NicDark Plugins – Unauthenticated Arbitrary Options Update
- Though several individual plugins are affected, the vulnerability is the same across each and they are covered by a single firewall rule.
- Affected plugin slugs are prefixed with
nd-. Example plugins include Components For WP Bakery Page Builder (slug:
nd-shortcodes), Booking (slug:
nd-booking), Travel Management (slug:
- Firewall rule released for Premium users on July 30, 2019
- Available for Free users starting August 29. 2019
- Simple 301 Redirects Addon – Bulk Uploader <= 1.2.5 – Unauthenticated Options Update
- Firewall rule released for Premium users on August 6, 2019
- Available for Free users starting September 5, 2019
- Bold Page Builder
- Blog Designer
- Live Chat with Facebook Messenger
- Yuzo Related Posts
- Visual CSS Style Editor
- WP Live Chat Support
- Form Lightbox
- Hybrid Composer
- WP Private Content Plus
- WP Mail SMTP by WPForms
- All former NicDark plugins (nd-booking, nd-travel, nd-learning, et. al.)
A list of IP addresses you should block if you are using free security software (or premium)
IP address causing most of the issues: 22.214.171.124
Additional IP addresses to block:
Vulnerable plugins have patch updates available for updates. We recommend updating any of these plugins on this list as soon as possible.
What can you do to minimise the chances of an attack?
1. Keep your website up to date – Theme Files, Plugins and WordPress versions. We recommend you do this weekly or at a minimum once a month. If you need assistance with this so you don’t have to worrk about it, we have website care plans available: https://smartrobbie.com.au/website-maintenance/
2. Set up a Sucuri Firewall – Sucuri is a great service. They can your site every 12 hours for any malware and send reports. They also have a firewall which blocks out any potential hacking. You can set the firewall to only allow backend access to approved IP addresses. Prices start at $199/year US – https://sucuri.net/. It’s a highly recommended service which we use in the event of any hacks. They are very efficient, remove the hack quickly and continue to monitor the site for the life of the plan. If you are hacked, get an account today and they will fix it for you.
Set up a free trial Sucuri firewall here:
3. WordFence Premium – Are you using the Free version of WordFence? We highly recommend upgrading to the Premium version:
- Receive real-time Firewall and Scan engine rule updates for protection as threats emerge
- Real-time IP Blacklist blocks the most malicious IPs from accessing your site
- Country blocking
- IP reputation monitoring
- Schedule scans to run more frequently and at optimal times
- Access to Premium Support
- Discounts for multi-year and multi-license purchases
Upgrade directly with Wordfence here ($99US/year)
Or if you prefer we can purchase a license for you, install and configure all the settings for the same price ($99/US > $147AU): https://smartrobbie.com.au/product/wordfence-premium/
4. Strong passwords – Make sure all your passwords are strong – if in doubt change them today.
5. Run a virus scan on your computer. There are multiple options that you can choose, including BitDefender, Kaspersky, Norton and Sophos. We also recommend looking at additional tools to protect your desktop, like Malwarebytes (Windows and Mac) and CleanBrowsing (DNS-based).
6. Keep backups of your site – there are a number of backup options for you. Not all hosting providers have automatic backups. Sample backup options: UpdraftPlus, BackupBuddy or you can get our offsite backup plan: https://smartrobbie.com.au/wordpress-backups/
Additional Reading on this specific attack and General information on keeping your site safe: