November 17

Large-Scale Attacks Focus on Epsilon Framework Themes

WordPress Vulnerabilities

0  comments

This post was originally published on this site

On November 17, 2020, our Threat Cleverness group noticed a large-level wave of episodes against recently reported Perform Injection vulnerabilities within themes utilizing the Epsilon Framework, which we estimate are usually installed on over 150,000 websites. So far today, we’ve seen a surge greater than 7.5 million assaults against a lot more than 1.5 million sites targeting these vulnerabilities, via over 18,000 IP addresses. While we from time to time see episodes targeting numerous sites, a lot of them target old vulnerabilities.

This wave of attacks is targeting vulnerabilities which have only been patched within the last couple of months. All Wordfence customers are shielded against these assaults, including Wordfence Premium clients and sites nevertheless running the free edition of Wordfence.

Vulnerable Themes

The following versions of the next themes are susceptible to these attacks:

Shapely <=1.2.7
NewsMag <=2.4.1
Activello <=1.4.0
Illdy <=2.1.4
Allegiant <=1.2.2
Newspaper X <=1.3.1
Pixova Lite <=2.0.5
Brilliance <=1.2.7
MedZone Lite <=1.2.4
Regina Lite <=2.0.4
Transcend <=1.1.8
Affluent <1.1.0
Bonkers <=1.0.4
Antreas <=1.0.2
NatureMag Lite <=1.0.5

Probing attacks – For now

For enough time being, almost all these attacks look like probing attacks, made to determine whether a niche site includes a vulnerable theme installed instead of to execute an exploit chain, though full Remote Code Execution(RCE) resulting in site takeover can be done with these vulnerabilities. Despite the fact that all Wordfence customers are secured, we strongly suggest updating as quickly as possible. We have been not providing additional details on the episodes at the moment, as the exploit will not yet seem to be in an adult state and a lot of IP addresses come in use. These assaults use POST requests to admin-ajax.php and therefore do not depart distinct log entries, though they’ll be visible within Wordfence Live Visitors.

What must i do?

If your site is working one of these brilliant themes, it is advisable to update to a patched version if one can be acquired. If no patched edition is available you will need to temporarily switch to some other theme or work with a firewall like Wordfence, either Premium or totally free, that blocks these episodes. If you have produced customizations to these designs minus the use of a kid theme, you will need to download a back-up copy of the existing edition before updating. If anyone you understand is running these themes, please reveal this article to make sure they update their web site as well.

The post Large-Scale Attacks Target Epsilon Framework Themes appeared first on Wordfence.

About the author 

WP Maintain Support Protect

You may also like

Who Attacked SolarWinds and just why WordPress Users Have to know

Who Attacked SolarWinds and just why WordPress Users Have to know

SolarWinds and offer Chain Attacks: Could this happen to WordPress?

SolarWinds and offer Chain Attacks: Could this happen to WordPress?

WordPress Hardening: 18 Methods to Harden Security of one’s Website

WordPress Hardening: 18 Methods to Harden Security of one’s Website
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Subscribe to our newsletter now!