SlideShare a Scribd company logo
Types of Security Threats WordPress
Websites Face: Part-1
WordPress is the most popular CMS on the planet with a 43.3% share of all
websites on the internet. WordPress with its flexibility and plethora of
features, themes, and plugins is the go-to choice for bloggers and developers
alike. But due to its widespread use, it catches the eyes of cyber threats and
attacks.
In February, critical WordPress vulnerabilities struck 9 plugins, affecting 1.3
million websites. I donโ€™t think you need more reasons to understand the
importance of securing your WordPress website.
Yes, we can never estimate the number of attacks or threats on our website(s).
This does not mean we should not know about them and fortify your websiteโ€™s
defenses before something happens! And if you think that your website and
passwords are impenetrable, then have a look at the 200 most common
passwords. ๐Ÿง
Although the war between good and evil seems endless, but with website
security you have a greater chance against malicious activities (for evil better
have an exorcist ๐Ÿ‘ป). Most of the WordPress site security issues are related. If
you fix one good, it gives an added protection from another issue, and so on.
So, the citizens of WordPress, here is the security threats bulletin, wanted over
the globe for disrupting, slowing down, data theft, etc. of wonderful and
good-looking websites:
Wanted: Dead or Alive
โ— Unsanctioned Logins
โ— Archaic Core Software
โ— Undefined User Roles
โ— Prehistoric Plugins and Themes
โ— Malware
โ— SQL (Structured Query Language) Injections
โ— SEO (Search Engine Optimization) Spam
Unsanctioned Logins
This exactly resembles movie scenes where the protagonist or antagonist tries
to break into a highly secure facility to steal valuable data. The major focus is
on cracking the password, where a computer runs like a matrix and fetches the
password. Thatโ€™s exactly how brute-force attacks work, providing
unsanctioned or unauthorized login access to the user.
In this type of attack, a bot is used that runs billions of potential combinations
of username-password, and if the hacker(s) get lucky, Voila! your ultra-safe
nobody can guess the password has been cracked in an exhaustive time of 2
minutes (not for all cases!). ๐Ÿ˜ต
Insights
1. Reaching the default backend page of a WordPress site is quite easy. All
you have to do is subjoin /wp-admin or /wp-login.php to the siteโ€™s main
URL, and youโ€™re at the backend page (Try
WPWhiteboard.com/wp-admin, works like a charm right?). It wonโ€™t
work with WPWhiteboard, ainโ€™t that easy to reach. ๐Ÿคฃ
2. Landing on the backend page is still a job half done, as cracking the
username and password is still a difficult task, but thanks to your
password and username choices, it might be a piece of ๐ŸŽ‚.
What Should I Do?
You mustโ€™ve heard and read this many times, but, once again for the sake of
your website and the cyber world, if you think your password is strong, think
again, no really, think again!
Let me show you the magic of using lowercase characters (LC), uppercase
characters (UC), digits, and special characters (SC) in your passwords. The
image below shows the stipulated time to crack a password if an algorithm is
guessing the password @ billions per second. ๐Ÿš€
And if you think, the whole reason behind keeping simple and common
passwords is that it makes it easier to remember them, then smarty pants it is
the generation of password managers! You can use them to store passwords,
just like my web browser does!
You can go beyond this and add another layer of security, with 2FA
(Two-factor Authentication). 2FA requires you to provide additional
information, mostly logging in on a separate device after filling in your
username and password. This makes the website more secure, and
impenetrable for at least a thousand years, give or take.
Also, you increase WordPress security by removing account(s) with the
โ€œadminโ€ username. If I can write it here, hackers can guess the same.
Remember brute force attack is all about cracking passwords, but that does
not mean you cannot add a weird and tough username, making attempts to
crack your password super tough and near impossible!
Archaic Core Software
An advantage of using WordPress as a CMS and a website-building platform is
that it gets regular and over-the-counter updates, making sure that your
website runs on the latest technology, and providing a seamless UX with
complete security. All you have to do is make sure your core software is
up-to-date!
WordPress developers roll out updates every quarter or so, hereโ€™s the recent
update Misha. Although itโ€™s up to you to use any version of WordPress. If you
are nowhere near codes and anecdotes, better check for updates and get it
done ASAP! ๐Ÿ‘จโ€๐Ÿ’ป
Insights
1. WordPress core updates along with providing innovative and useful
features also address critical WordPress security threats. Check if your
website is running on old software, if yes, Iโ€™d suggest you update real
quick!
2. Also, you make sure that the plugins and theme of your WordPress
website are updated and up-to-date with the latest WordPress version.
Iโ€™ve discussed this in detail below, keep readingโ€ฆ
What Should I Do?
You have to make sure that you stay updated on the latest WP version.
WordPress updates to the next version automatically. But, if you have disabled
that, you can see the latest update shown on the WordPress dashboard (image
below!). To know about the latest releases of WordPress, read here!
ill-Defined User Roles
Each role comes with its default permissions that provide various levels of
access to your website. If you want someone to just post on your blog, or
someone to just check and respond to comments, etc.
Each role comes with default permissions that authorize or restrict users to
take specific actions on your site, like, installing/modifying plugins, publishing
content, changing settings, etc. When you create a new user on your
WordPress website, the default role given is Administrator. Make sure to
change and allocate the roles with caution!
In WordPress, there are four default user roles to choose from:
โ— Administrator: Have access to all the admin features, basically
complete control over a website. ๐Ÿ•น๏ธ
โ— Editor: Can publish and manage thy own posts, along with other posts
on the website.
โ— Author: Publish and manage thy own posts.
โ— Contributor: Edit and create thy own posts, but cannot publish them.
โ— Subscriber: Manage, update their own profile, view posts, and write
comments.
As WordPress is known for its customization, you can also make
custom-defined user roles. Interesting, right? Many plugins offer different
user roles. Letโ€™s take the Yoast SEO plugin for example. It comes with two
additional user roles:
โ— SEO Manager: All SEO capabilities, including full access to the Yoast
SEO settings, and features.
โ— SEO Editor: Access to features of Yoast SEO meta box. No access to
sidebar settings can make and manage redirects.
Super Admins have access to multi-site and single-site administration
features.
Insights
In the case of multiple users, where everyone is admin, it could become a
major security concern. So, if anyone has a weak password or has left login
credentials somewhere, could bring havoc to your website. No offense or
allegations, Iโ€™ll just quote Murphyโ€™s law: โ€œAnything that can go wrong
will go wrongโ€.
So, ill-defined admin roles kinda increase the risks to your website. If a
brute-force attack is successful, then a hacker gets a VIP pass to your website.
Also, XSS (weโ€™ll cover this in detail below) can enable hacker(s) to have
front-end capability, and obtain vital information from your siteโ€™s visitors.
What Should I Do?
One knot you should tie on your worksheet is to regularly scan all permissions
of your website. If youโ€™re the only admin, make sure you use 2fa and create an
indestructible password.
If you are assigning roles to other users, make sure to give them the necessary
permissions only. Also, no matter what the role is, make sure all your users
strengthen their passwords and use 2fa.
Make sure you give necessary permissions to the users of your website. As
mishaps can happen, hackers are always waiting for an opportunity. Also, itโ€™s
not just about vulnerability to external factors, sometimes, mistakes happen.
For eg. a contributor can delete a high-performing post by mistake ๐Ÿ˜ฑ, owing
to less knowledge of WordPress. But, you gave him an admin user role, so, itโ€™s
your fault!
Historic Plugins and Themes
WordPress is extremely popular for its flexibility and ease of use. It is owing to
the design and development capabilities it offers to both creators and
developers. Endless customization options, the ability to design and change
every element, etc. are one of the major appeals which pull people to
WordPress.
Also, it is a great marketplace with developers and designers creating
hundreds of themes and plugins for you to use and build the website you
dream of! But, as we read about using old core software can cause WordPress
security threats, the same is the case with outdated themes and plugins.
Acc. to WPScan, 97% of vulnerabilities in their database are plugins and
themes, while only 3% comes from the core software.
Insights
Most of the plugin and theme developers release functionality enhancements,
security fixes, and additional features with frequent updates. But, it does not
happen with all the themes and plugins.
Those remaining plugins and themes in use with no updates, often open doors
for hackers and leave your site vulnerable. How do you ask? Letโ€™s say thereโ€™s a
vulnerability related to theme templates and its creation. If your theme is not
up-to-date with the latest WordPress version which solves the issue. A hacker
can exploit the themeโ€™s vulnerabilities to gain control of your site.
What Should I Do?
Updates improve website security but also increase the overall WordPress
experience with many feature additions, fixes, etc. You should monitor for
updates and ensure that your website is running on the latest version of
themes and plugins, compatible with the latest core software.
When updates are available for plugins and themes, you can install them
manually or use a plugin to automatically install them as they go live. So,
make sure you regularly check your plugins and themes and update them to
the latest version.
Malware
Malware includes any malicious software, thus, taking its name; โ€˜Malโ€™+ โ€˜Wareโ€™.
These malicious files can be placed in legitimate files, plant codes in existing
files, etc. Hackers use these methods to steal data from websites, their visitors,
and wreak havoc on a website.
Example, ZeuS is a modular banking trojan which uses keystroke logging to
compromise victim credentials when the user visits a banking website. Since
the release of the ZeuS source code in 2011, many other malware variants have
adopted parts of its codebase, which means that events classified as ZeuS may
actually be other malware using parts of the ZeuS code.
Insights
The threats we discussed in this article are directly related in some way.
Malware usually enters through unauthorized and historic themes and
plugins. Hackers can take advantage of security issues in themes and plugins,
imitate them, or create new add-ons to place harmful codes on your website.
WordPress has a default check in place that restricts the file types for users. If
you try to upload a file that isnโ€™t there in the database, an error message
occurs, or simply the file will not upload. This step is good as a preventive
measure but can be easily bypassed if someone gains access as the
administrator.
What Should I Do?
Carefully check the theme and plugins your website uses or planning to use.
WP.org lists all valuable stats in their directory, check out the image below:
You can check these statistics out on wordpress.org/themes or
wordpress.org/plugins. Select a plugin/theme and youโ€™ll find the related stats
on the right!
Take an additional step by conducting regular security scans to find any
potential issue or malware hiding on your WordPress website. There are many
plugins you can use to do this job without any trouble (Donโ€™t worry these are
highly rated and extremely secure plugins). For example, Wordfence security,
Jetpack, etc.
Structured Query Language (SQL) Injections
SQL is a programming language used to access stored data on a site. Itโ€™s the
preferred language on WordPress when it comes to database management. It
is secure, but there is no stopping malicious intents, right?
An SQL injection enables a hacker to modify your siteโ€™s database directly.
Attackers can make/modify accounts, and add unauthorized links, content,
etc. They can also edit, delete, and leak important data and information on the
site.
Insights
WordPress sites are designed to have a broader approach, catering to the
community. Attackers often exploit visitor-facing submissions like contact
forms, payment fields, lead forms, etc. Hackers use these fields to submit
codes that will run and make changes on your site.
What Should I Do?
The best course: Be careful of every user input! As any form submission on
your site can be used by attackers to submit information to your SQL
database.
You can outsmart attackers by restricting the submission of special characters
in visitor form submissions. Without symbols, a malicious code turns into
harmless gibberish (Ha-Ha, look whoโ€™s laughing now!). You can make use of a
form plugin, or security plugin to do this for you. You can also step up the
game by having a captcha as the final step before any visitor submission. ๐Ÿ˜‰
Search Engine Optimization (SEO) Spam
SEO spam is similar in nature to SQL injections but is targeted at the most
precious asset of your site: SEO. This spam attacks your top-ranking pages
and fills them with spam keywords, pop-up ads, etc. to sell fake merchandise.
Insights
These are often caused by: old plugins, themes, and core software. Not only
this, brute force attacks and ill-defined user roles can also add to increasing
your WordPress siteโ€™s vulnerability.
Beware as these hacks are hard to detect, as after hacking attackers wait to not
raise any suspicion. Since it is SEO spam, theyโ€™re targeted at your top-ranking
pages, so you will overlook them when conducting your review and analysis. A
simple keyword placement like โ€œcheap Hermes bagsโ€, in between the content
of your website, without breaking the original code of the site.
SEO spam is wide open to SEO crawlers, as theyโ€™ll index your site for the
spammy keywords and users searching for Hermes bags (or whatever the
spammy keyword is).
What Should I Do?
First of all, make sure your theme and plugin are updated and compatible with
the latest WordPress version. Double-check your user roles and how you have
defined each of them. You can also use WordPress security plugins to run
security, malware, database scans, etc.
If you wish to take the command in your hands, then keep your eyes like a
hawk on the analytics data of your website. Look out for sudden changes in
SERP positions, and increased site traffic for no apparent reason.
You may also get notifications from an internet browser about notices featured
on your site that arenโ€™t related to it. If you have coding knowledge, you can go
through the ranking pages that affects and attempt to identify the misplaced
keywords.
Whatever you do, target and address these hacks early on. SEO crawlers will
strike these spammy tactics, and in that process, your hard work, your
websiteโ€™s ranking, and your position take a major hit!
Conclusion
Security and Data Privacy+Protection need to be given more priority. Because,
honestly speaking, we do not give much importance to it. If youโ€™re new to
website security or an old veteran, sometimes, we tend to overlook these
details which may lead to bigger problems. So, prevention is the best
medicine, always!
Well, here are 7 types of security threats a WordPress website may face. You
know what, it doesnโ€™t end here, because we want you to have All-Thing
Everything WordPress. So, hereโ€™s part 2 of this article covering some more
threats and how you can defend against them.
Feel free to drop your comments on some more useful tips and tricks to
safeguard your website. And if youโ€™re the shy kind, you can always write to us
at hi@wpwhiteboard.com.

More Related Content

Similar to Types of Security Threats WordPress Websites Face: Part-1

WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
Angela Bowman
ย 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issues
Deepu Thomas
ย 

Similar to Types of Security Threats WordPress Websites Face: Part-1 (20)

WordPress Security Guide
WordPress Security GuideWordPress Security Guide
WordPress Security Guide
ย 
How to Resolve Recurring WordPress Problems?
How to Resolve Recurring WordPress Problems?How to Resolve Recurring WordPress Problems?
How to Resolve Recurring WordPress Problems?
ย 
Wordpress
WordpressWordpress
Wordpress
ย 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
ย 
Is your Wordpress safe enough?
Is your Wordpress safe enough? Is your Wordpress safe enough?
Is your Wordpress safe enough?
ย 
HOW TO PROTECT YOUR WORDPRESS WEBSITE FROM HACKERS
HOW TO PROTECT YOUR WORDPRESS WEBSITE FROM HACKERSHOW TO PROTECT YOUR WORDPRESS WEBSITE FROM HACKERS
HOW TO PROTECT YOUR WORDPRESS WEBSITE FROM HACKERS
ย 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
ย 
Introduction to WordPress Slides from WordCamp 2012 by Gary A. Bacon
Introduction to WordPress Slides from WordCamp 2012 by Gary A. BaconIntroduction to WordPress Slides from WordCamp 2012 by Gary A. Bacon
Introduction to WordPress Slides from WordCamp 2012 by Gary A. Bacon
ย 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress Security
ย 
Improve WordPress Security How To
Improve WordPress Security How ToImprove WordPress Security How To
Improve WordPress Security How To
ย 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issues
ย 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2
ย 
7 must have word press plugins for web developers
7 must have word press plugins for web developers7 must have word press plugins for web developers
7 must have word press plugins for web developers
ย 
Don't let your WordPress site get hacked
Don't let your WordPress site get hackedDon't let your WordPress site get hacked
Don't let your WordPress site get hacked
ย 
Content Management System(CMS) & Basic WordPress
Content Management System(CMS) & Basic WordPressContent Management System(CMS) & Basic WordPress
Content Management System(CMS) & Basic WordPress
ย 
Secure wordpress site
Secure wordpress siteSecure wordpress site
Secure wordpress site
ย 
Popular Wordpress Plug-ins of May 2013
Popular Wordpress Plug-ins of May 2013Popular Wordpress Plug-ins of May 2013
Popular Wordpress Plug-ins of May 2013
ย 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
ย 
WordPress Hardening: Strategies to Secure & Protect Your Website
WordPress Hardening: Strategies to Secure & Protect Your WebsiteWordPress Hardening: Strategies to Secure & Protect Your Website
WordPress Hardening: Strategies to Secure & Protect Your Website
ย 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
ย 

Recently uploaded

20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
ย 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
ย 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
Khaled Al Awadi
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
ย 

Recently uploaded (20)

Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
ย 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
ย 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
ย 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
ย 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
ย 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
ย 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
ย 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
ย 
Strategy Analysis and Selecting ( Space Matrix)
Strategy Analysis and Selecting ( Space Matrix)Strategy Analysis and Selecting ( Space Matrix)
Strategy Analysis and Selecting ( Space Matrix)
ย 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
ย 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
ย 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
ย 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
ย 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
ย 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
ย 
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdfMaximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
ย 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings release
ย 

Types of Security Threats WordPress Websites Face: Part-1

  • 1. Types of Security Threats WordPress Websites Face: Part-1 WordPress is the most popular CMS on the planet with a 43.3% share of all websites on the internet. WordPress with its flexibility and plethora of features, themes, and plugins is the go-to choice for bloggers and developers alike. But due to its widespread use, it catches the eyes of cyber threats and attacks.
  • 2. In February, critical WordPress vulnerabilities struck 9 plugins, affecting 1.3 million websites. I donโ€™t think you need more reasons to understand the importance of securing your WordPress website. Yes, we can never estimate the number of attacks or threats on our website(s). This does not mean we should not know about them and fortify your websiteโ€™s defenses before something happens! And if you think that your website and passwords are impenetrable, then have a look at the 200 most common passwords. ๐Ÿง Although the war between good and evil seems endless, but with website security you have a greater chance against malicious activities (for evil better have an exorcist ๐Ÿ‘ป). Most of the WordPress site security issues are related. If you fix one good, it gives an added protection from another issue, and so on. So, the citizens of WordPress, here is the security threats bulletin, wanted over the globe for disrupting, slowing down, data theft, etc. of wonderful and good-looking websites:
  • 3. Wanted: Dead or Alive โ— Unsanctioned Logins โ— Archaic Core Software โ— Undefined User Roles โ— Prehistoric Plugins and Themes โ— Malware โ— SQL (Structured Query Language) Injections โ— SEO (Search Engine Optimization) Spam Unsanctioned Logins This exactly resembles movie scenes where the protagonist or antagonist tries to break into a highly secure facility to steal valuable data. The major focus is on cracking the password, where a computer runs like a matrix and fetches the password. Thatโ€™s exactly how brute-force attacks work, providing unsanctioned or unauthorized login access to the user. In this type of attack, a bot is used that runs billions of potential combinations of username-password, and if the hacker(s) get lucky, Voila! your ultra-safe nobody can guess the password has been cracked in an exhaustive time of 2 minutes (not for all cases!). ๐Ÿ˜ต
  • 4. Insights 1. Reaching the default backend page of a WordPress site is quite easy. All you have to do is subjoin /wp-admin or /wp-login.php to the siteโ€™s main URL, and youโ€™re at the backend page (Try WPWhiteboard.com/wp-admin, works like a charm right?). It wonโ€™t work with WPWhiteboard, ainโ€™t that easy to reach. ๐Ÿคฃ 2. Landing on the backend page is still a job half done, as cracking the username and password is still a difficult task, but thanks to your password and username choices, it might be a piece of ๐ŸŽ‚. What Should I Do? You mustโ€™ve heard and read this many times, but, once again for the sake of your website and the cyber world, if you think your password is strong, think again, no really, think again! Let me show you the magic of using lowercase characters (LC), uppercase characters (UC), digits, and special characters (SC) in your passwords. The image below shows the stipulated time to crack a password if an algorithm is guessing the password @ billions per second. ๐Ÿš€
  • 5. And if you think, the whole reason behind keeping simple and common passwords is that it makes it easier to remember them, then smarty pants it is the generation of password managers! You can use them to store passwords, just like my web browser does! You can go beyond this and add another layer of security, with 2FA (Two-factor Authentication). 2FA requires you to provide additional information, mostly logging in on a separate device after filling in your username and password. This makes the website more secure, and impenetrable for at least a thousand years, give or take. Also, you increase WordPress security by removing account(s) with the โ€œadminโ€ username. If I can write it here, hackers can guess the same. Remember brute force attack is all about cracking passwords, but that does not mean you cannot add a weird and tough username, making attempts to crack your password super tough and near impossible!
  • 6. Archaic Core Software An advantage of using WordPress as a CMS and a website-building platform is that it gets regular and over-the-counter updates, making sure that your website runs on the latest technology, and providing a seamless UX with complete security. All you have to do is make sure your core software is up-to-date! WordPress developers roll out updates every quarter or so, hereโ€™s the recent update Misha. Although itโ€™s up to you to use any version of WordPress. If you are nowhere near codes and anecdotes, better check for updates and get it done ASAP! ๐Ÿ‘จโ€๐Ÿ’ป Insights 1. WordPress core updates along with providing innovative and useful features also address critical WordPress security threats. Check if your website is running on old software, if yes, Iโ€™d suggest you update real quick! 2. Also, you make sure that the plugins and theme of your WordPress website are updated and up-to-date with the latest WordPress version. Iโ€™ve discussed this in detail below, keep readingโ€ฆ What Should I Do? You have to make sure that you stay updated on the latest WP version. WordPress updates to the next version automatically. But, if you have disabled that, you can see the latest update shown on the WordPress dashboard (image below!). To know about the latest releases of WordPress, read here!
  • 7. ill-Defined User Roles Each role comes with its default permissions that provide various levels of access to your website. If you want someone to just post on your blog, or someone to just check and respond to comments, etc. Each role comes with default permissions that authorize or restrict users to take specific actions on your site, like, installing/modifying plugins, publishing content, changing settings, etc. When you create a new user on your WordPress website, the default role given is Administrator. Make sure to change and allocate the roles with caution! In WordPress, there are four default user roles to choose from: โ— Administrator: Have access to all the admin features, basically complete control over a website. ๐Ÿ•น๏ธ โ— Editor: Can publish and manage thy own posts, along with other posts on the website. โ— Author: Publish and manage thy own posts. โ— Contributor: Edit and create thy own posts, but cannot publish them. โ— Subscriber: Manage, update their own profile, view posts, and write comments.
  • 8. As WordPress is known for its customization, you can also make custom-defined user roles. Interesting, right? Many plugins offer different user roles. Letโ€™s take the Yoast SEO plugin for example. It comes with two additional user roles: โ— SEO Manager: All SEO capabilities, including full access to the Yoast SEO settings, and features. โ— SEO Editor: Access to features of Yoast SEO meta box. No access to sidebar settings can make and manage redirects. Super Admins have access to multi-site and single-site administration features. Insights In the case of multiple users, where everyone is admin, it could become a major security concern. So, if anyone has a weak password or has left login credentials somewhere, could bring havoc to your website. No offense or allegations, Iโ€™ll just quote Murphyโ€™s law: โ€œAnything that can go wrong will go wrongโ€. So, ill-defined admin roles kinda increase the risks to your website. If a brute-force attack is successful, then a hacker gets a VIP pass to your website. Also, XSS (weโ€™ll cover this in detail below) can enable hacker(s) to have front-end capability, and obtain vital information from your siteโ€™s visitors. What Should I Do? One knot you should tie on your worksheet is to regularly scan all permissions of your website. If youโ€™re the only admin, make sure you use 2fa and create an indestructible password. If you are assigning roles to other users, make sure to give them the necessary permissions only. Also, no matter what the role is, make sure all your users strengthen their passwords and use 2fa.
  • 9. Make sure you give necessary permissions to the users of your website. As mishaps can happen, hackers are always waiting for an opportunity. Also, itโ€™s not just about vulnerability to external factors, sometimes, mistakes happen. For eg. a contributor can delete a high-performing post by mistake ๐Ÿ˜ฑ, owing to less knowledge of WordPress. But, you gave him an admin user role, so, itโ€™s your fault! Historic Plugins and Themes WordPress is extremely popular for its flexibility and ease of use. It is owing to the design and development capabilities it offers to both creators and developers. Endless customization options, the ability to design and change every element, etc. are one of the major appeals which pull people to WordPress. Also, it is a great marketplace with developers and designers creating hundreds of themes and plugins for you to use and build the website you dream of! But, as we read about using old core software can cause WordPress security threats, the same is the case with outdated themes and plugins. Acc. to WPScan, 97% of vulnerabilities in their database are plugins and themes, while only 3% comes from the core software. Insights Most of the plugin and theme developers release functionality enhancements, security fixes, and additional features with frequent updates. But, it does not happen with all the themes and plugins. Those remaining plugins and themes in use with no updates, often open doors for hackers and leave your site vulnerable. How do you ask? Letโ€™s say thereโ€™s a vulnerability related to theme templates and its creation. If your theme is not up-to-date with the latest WordPress version which solves the issue. A hacker can exploit the themeโ€™s vulnerabilities to gain control of your site.
  • 10. What Should I Do? Updates improve website security but also increase the overall WordPress experience with many feature additions, fixes, etc. You should monitor for updates and ensure that your website is running on the latest version of themes and plugins, compatible with the latest core software. When updates are available for plugins and themes, you can install them manually or use a plugin to automatically install them as they go live. So, make sure you regularly check your plugins and themes and update them to the latest version. Malware Malware includes any malicious software, thus, taking its name; โ€˜Malโ€™+ โ€˜Wareโ€™. These malicious files can be placed in legitimate files, plant codes in existing files, etc. Hackers use these methods to steal data from websites, their visitors, and wreak havoc on a website. Example, ZeuS is a modular banking trojan which uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS source code in 2011, many other malware variants have adopted parts of its codebase, which means that events classified as ZeuS may actually be other malware using parts of the ZeuS code. Insights The threats we discussed in this article are directly related in some way. Malware usually enters through unauthorized and historic themes and plugins. Hackers can take advantage of security issues in themes and plugins, imitate them, or create new add-ons to place harmful codes on your website. WordPress has a default check in place that restricts the file types for users. If you try to upload a file that isnโ€™t there in the database, an error message occurs, or simply the file will not upload. This step is good as a preventive measure but can be easily bypassed if someone gains access as the administrator.
  • 11. What Should I Do? Carefully check the theme and plugins your website uses or planning to use. WP.org lists all valuable stats in their directory, check out the image below: You can check these statistics out on wordpress.org/themes or wordpress.org/plugins. Select a plugin/theme and youโ€™ll find the related stats on the right! Take an additional step by conducting regular security scans to find any potential issue or malware hiding on your WordPress website. There are many plugins you can use to do this job without any trouble (Donโ€™t worry these are highly rated and extremely secure plugins). For example, Wordfence security, Jetpack, etc. Structured Query Language (SQL) Injections SQL is a programming language used to access stored data on a site. Itโ€™s the preferred language on WordPress when it comes to database management. It is secure, but there is no stopping malicious intents, right? An SQL injection enables a hacker to modify your siteโ€™s database directly. Attackers can make/modify accounts, and add unauthorized links, content, etc. They can also edit, delete, and leak important data and information on the site.
  • 12. Insights WordPress sites are designed to have a broader approach, catering to the community. Attackers often exploit visitor-facing submissions like contact forms, payment fields, lead forms, etc. Hackers use these fields to submit codes that will run and make changes on your site. What Should I Do? The best course: Be careful of every user input! As any form submission on your site can be used by attackers to submit information to your SQL database. You can outsmart attackers by restricting the submission of special characters in visitor form submissions. Without symbols, a malicious code turns into harmless gibberish (Ha-Ha, look whoโ€™s laughing now!). You can make use of a form plugin, or security plugin to do this for you. You can also step up the game by having a captcha as the final step before any visitor submission. ๐Ÿ˜‰ Search Engine Optimization (SEO) Spam SEO spam is similar in nature to SQL injections but is targeted at the most precious asset of your site: SEO. This spam attacks your top-ranking pages and fills them with spam keywords, pop-up ads, etc. to sell fake merchandise. Insights These are often caused by: old plugins, themes, and core software. Not only this, brute force attacks and ill-defined user roles can also add to increasing your WordPress siteโ€™s vulnerability. Beware as these hacks are hard to detect, as after hacking attackers wait to not raise any suspicion. Since it is SEO spam, theyโ€™re targeted at your top-ranking pages, so you will overlook them when conducting your review and analysis. A simple keyword placement like โ€œcheap Hermes bagsโ€, in between the content of your website, without breaking the original code of the site.
  • 13. SEO spam is wide open to SEO crawlers, as theyโ€™ll index your site for the spammy keywords and users searching for Hermes bags (or whatever the spammy keyword is). What Should I Do? First of all, make sure your theme and plugin are updated and compatible with the latest WordPress version. Double-check your user roles and how you have defined each of them. You can also use WordPress security plugins to run security, malware, database scans, etc. If you wish to take the command in your hands, then keep your eyes like a hawk on the analytics data of your website. Look out for sudden changes in SERP positions, and increased site traffic for no apparent reason. You may also get notifications from an internet browser about notices featured on your site that arenโ€™t related to it. If you have coding knowledge, you can go through the ranking pages that affects and attempt to identify the misplaced keywords. Whatever you do, target and address these hacks early on. SEO crawlers will strike these spammy tactics, and in that process, your hard work, your websiteโ€™s ranking, and your position take a major hit!
  • 14. Conclusion Security and Data Privacy+Protection need to be given more priority. Because, honestly speaking, we do not give much importance to it. If youโ€™re new to website security or an old veteran, sometimes, we tend to overlook these details which may lead to bigger problems. So, prevention is the best medicine, always! Well, here are 7 types of security threats a WordPress website may face. You know what, it doesnโ€™t end here, because we want you to have All-Thing Everything WordPress. So, hereโ€™s part 2 of this article covering some more threats and how you can defend against them. Feel free to drop your comments on some more useful tips and tricks to safeguard your website. And if youโ€™re the shy kind, you can always write to us at hi@wpwhiteboard.com.