At the weekend, some hackers started mass attacks targeting WordPress sites. The attackers are taking advantage of old ones vulnerabilities into a uninformed plugins in order to steal configuration files from WordPress sites.
Taking advantage of these vulnerabilities allows you to download or export wp-config.php files from uninformed websites and export database credentials. Then the hackers can use usernames and passwords to take control of databases.
Gall said that "this campaign represents 75% of the total effort to exploit vulnerabilities in plugins and issues in the WordPress ecosystem."
According to Gall, WordFence has blocked more than one 130 million attempted attacks only on its network. These attempts targeted more than 1,3 million WordPress websites. However, analysts believe that the attackers are targeting even more sites.
The Wordfence analyst said the attacks were carried out by one network 20.000 different IP addresses. Most of these IP addresses were also used in another similar large-scale campaign aimed at WordPress sites in early May.
During the first hacking campaign, the attackers had taken advantage XSS (cross-site scripting) vulnerabilities and had tried to introduce new administrators and backdoors to targeted sites.
The first campaign was also very large, as XSS attacks outperformed XSS attacks carried out by other hacking teams in the past (as shown in the diagram below).
Analyst Gall believes the two campaigns are coming most likely by themselves hackers, despite the fact that different vulnerabilities were used for the attacks.