HomeSecurity OperationsHackers selling WordPress zero-day exploits on hacker forums

Hackers selling WordPress zero-day exploits on hacker forums

Published on

spot_img
Hackers selling WordPress zero-day exploits on hacker forums

A recent post on a hacker forum has raised concerns as it advertises the sale of a WordPress 0-day exploit. The seller claims that this exploit, known as “Autoshell,” is a PHP script that can be paired with a WordPress plugin to upload a shell to around 110,000 vulnerable websites and extract a list of their URLs.

The exploit is being offered for a starting price of 10k, which the seller suggests is a steal compared to similar exploits on the market. This PHP script has the capability to upload a file to numerous websites, indicating a potentially widespread vulnerability within the WordPress ecosystem.

The sale of such exploits poses a significant threat to website owners and users alike, as it opens the door to unauthorized access, data breaches, and other malicious activities. Security experts are warning WordPress site administrators to remain vigilant, ensure their software is up to date, and monitor their websites for any suspicious behavior. Utilizing security plugins and firewalls is also recommended to help mitigate the risk of such exploits.

In response to this alarming development, ThreatMon, a Cyber Threat intelligence platform, tweeted about a threat actor on a forum selling a WordPress 0day exploit. This actor purportedly has an Autoshell script that can work with any PHP file and the WordPress plugin.

The cybersecurity community is actively monitoring the situation and working to identify and patch any vulnerabilities that this exploit may target. It is crucial for website owners to adhere to security best practices and subscribe to security bulletins to stay informed about the latest threats and vulnerabilities.

The seller of the exploit has made it clear that they will only accept cryptocurrency as payment and will not engage in any transaction unless payment is received first. This underscores the underground and illicit nature of these transactions, highlighting the ongoing challenges faced by cybersecurity professionals in combatting the sale and use of exploits on the dark web and hacker forums.

To protect against malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, companies are encouraged to use tools like Perimeter81 malware protection. These malicious threats can cause severe damage to networks and compromise sensitive information if not adequately defended against.

As the cybersecurity landscape continues to evolve, it is essential for organizations to stay informed about the latest threats and vulnerabilities. Following cybersecurity news, whitepapers, and infographics can provide valuable insights into emerging threats and best practices for safeguarding digital assets. Stay updated on cybersecurity news by following reputable sources on LinkedIn and Twitter.

Source link

Latest articles

Ketchikan Borough recovers $625k stolen by email hacker

The Ketchikan Gateway Borough has recently made a significant recovery after falling victim to...

Ukraine Hackers Target Major Russian Banks with DDoS Attacks

Several major Russian banks faced technical issues with their mobile apps and websites, causing...

Millions of Devices at Risk of ‘PKFail’ Secure Boot Bypass Vulnerability

A critical security flaw in the Secure Boot process has been discovered, allowing attackers...

AI-Powered Cybercrime Service: Phishing Kits Bundled with Malicious Android Apps

In a recent development in the realm of cybercrimes, a Spanish-speaking cybercrime group known...

More like this

Ketchikan Borough recovers $625k stolen by email hacker

The Ketchikan Gateway Borough has recently made a significant recovery after falling victim to...

Ukraine Hackers Target Major Russian Banks with DDoS Attacks

Several major Russian banks faced technical issues with their mobile apps and websites, causing...

Millions of Devices at Risk of ‘PKFail’ Secure Boot Bypass Vulnerability

A critical security flaw in the Secure Boot process has been discovered, allowing attackers...
en_USEnglish