Web Security

  • Clever SEO Spam Injection 17 December 2018 Clever SEO Spam Injection

    It’s very common for us here at Sucuri to face SEO injections on almost any type of CMS-based site. Today, I’ll be presenting how one particularly ingenious malware manages to hide so well inside a WordPress website.

    The Traditional Approach

    There are two common approaches attackers use to inject SEO spam on websites:

    1. Injecting HTML code for concealed elements in theme files
    2. Injecting fake spam posts in the WordPress database

    Both approaches are readily found during Sucuri’s routine remediation process.

    Continue reading Clever SEO Spam Injection at Sucuri Blog.

  • Naughty or Nice Websites 14 December 2018 Naughty or Nice Websites

    Santa Claus is coming! Was your website naughty or nice this year?

    Here is a quick checklist of the top 10 bad things that can harm your website security and the top 10 good things that can improve your website security.

    Naughty Websites List

    If your website falls into any of these categories, this is the perfect time of year to start thinking about improving your security posture.

    1 – My website has outdated software.

    Continue reading Naughty or Nice Websites at Sucuri Blog.

  • OWASP Top 10 Security Risks – Part III 11 December 2018 OWASP Top 10  Security Risks – Part III

    To bring awareness to what threatens the integrity of websites, we are continuing a series of posts on the OWASP top 10 security risks.

    The OWASP Top 10 list consists of the 10 most seen application vulnerabilities:

    1. Injection
    2. Broken Authentication
    3. Sensitive data exposure
    4. XML External Entities (XXE)
    5. Broken Access control
    6. Security misconfigurations
    7. Cross Site Scripting (XSS)
    8. Insecure Deserialization
    9. Using Components with known vulnerabilities
    10. Insufficient logging and monitoring

    In our previous posts, we explained the first four items on the OWASP Top 10 list.

    Continue reading OWASP Top 10 Security Risks – Part III at Sucuri Blog.

  • Fake Volkswagen Campaign Spreads Through Social Networks 7 December 2018 Fake Volkswagen Campaign Spreads Through Social Networks

    We recently investigated a suspicious link received by one of my colleagues on WhatsApp. The message (in Portuguese) states that Volkswagen is offering 20 free cars until the end of the year, and directs users to participate on a site that has been apparently crafted especially for this “event”.

    After an initial investigation, it became clear that something was not right with the site. Several security vendors blacklisted it as a phishing site–although fishy, none of the classic phishing characteristics were present.

    Continue reading Fake Volkswagen Campaign Spreads Through Social Networks at Sucuri Blog.

  • Localization and Customization of Credit Card Stealing Malware 6 December 2018 Localization and Customization of Credit Card Stealing Malware

    Credit card stealing malware is becoming more and more customized. We’ve been regularly seeing injected scripts with URLs that either mimic or include a portion of the victim’s site domain. Sometimes the injected code also references the victim’s site.

    Recently, we’ve come across another level of customization.

    Fake Payment Form in Bulgarian

    A compromised Magento site had the following script injected into its core_config_data table.

    hxxps://elegrina[.]com/assets/<domain>.js,  where <domain> was the second-level domain of the infected site.

    Continue reading Localization and Customization of Credit Card Stealing Malware at Sucuri Blog.

  • Using Innocent Roles to Hide Admin Users 4 December 2018 Using Innocent Roles to Hide Admin Users

    All across the internet, we find guides and tutorials on how to keep your WordPress site secure. Most of them approach the concept of user roles, but not many actually approach the capabilities of those roles.

    The way the capabilities are handled on WordPress makes it quite easy to change what each role is allowed to do.

    How WordPress Sets Role Capabilities

    First, let’s take a look at how WordPress manages the capabilities of the roles and what they are allowed to do, such as:

    • add users;
    • remove users;
    • create posts;
    • delete posts, etc.

    Continue reading Using Innocent Roles to Hide Admin Users at Sucuri Blog.

  • What is Phishing? 29 November 2018 What is Phishing?

    Phishing is a serious threat to any industry. We have seen this topic appear in the news more each day. You might have already received a fraudulent email from what seemed to be your bank or even seen the hacking that took place during the 2016 US presidential election. But what do you know about phishing?

    What is Phishing?

    Phishing is the fraudulent attempt to obtain sensitive information like login information or other personal identification information (PII), which is any data that could potentially identify a specific individual, such as:

    • usernames,
    • passwords,
    • credit card details,
    • SSN (Social Security Number),
    • bank account information,
    • email,
    • phone number,
    • secret question answers

    Even partial information can increase the chances of success to subsequent social engineering attacks.

    Continue reading What is Phishing? at Sucuri Blog.

  • Fear, Uncertainty, and Doubt 26 November 2018 Fear, Uncertainty, and Doubt

    There’s a term for the practice of scaring potential customers into purchasing products or services they don’t need: FUD; fear, uncertainty, and doubt. This practice is widespread in the computer/IT industries at large, but is especially present in the security industry.

    People don’t want to get hacked—but may also not understand the issues and forces at play. This makes them easy targets for overzealous sales representatives who see an opportunity to use misinformation to increase their paycheck via commission payouts.

    Continue reading Fear, Uncertainty, and Doubt at Sucuri Blog.

  • Navigating Data Responsibility 21 November 2018 Navigating Data Responsibility

    As we take a step back and think about how much the Internet has grown over the past 20 years, we realize how much content/data has been made available to everyone.

    Moving forward, there’s no reason to expect data availability to slow down. In fact, insideBIGDATA claims:

    There are many sources that predict exponential data growth toward 2020 and beyond. Yet they are all in broad agreement that the size of the digital universe will double every two years at least, a 50-fold growth from 2010 to 2020.

    Continue reading Navigating Data Responsibility at Sucuri Blog.

  • A Scam-Free Cyber Monday for Online Businesses 19 November 2018 A Scam-Free Cyber Monday for Online Businesses

    Every year we see an increase in website attacks during the holidays. 

    While business owners see their sales go up due to promotional Black Friday and Cyber Monday campaigns, hackers are in the background working nonstop to create malicious, fraudulent websites as well as take advantage of legitimate ones.

    Main Cyber Monday Threats
    Phishing Pages

    One of the major risks to consumers is phishing campaigns.

    Carefully crafted phishing login pages convince users they are logging into a valid service.

    Continue reading A Scam-Free Cyber Monday for Online Businesses at Sucuri Blog.

  • PCI for SMB: Requirement 9 – Implement Strong Access Control Measures 16 November 2018 PCI for SMB: Requirement 9 – Implement Strong Access Control Measures

    Welcome to the sixth post of a series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessment Questionnaires).

    In the previous articles written about PCI, we covered the following:

    • Requirement 1: Build and Maintain a Secure Network – Install and maintain a firewall configuration to protect cardholder data.
    • Requirement 2: Build and Maintain a Secure Network – Do not use vendor-supplied defaults for system passwords or other security parameters.

    Continue reading PCI for SMB: Requirement 9 – Implement Strong Access Control Measures at Sucuri Blog.