Hacked Home Routers are Launching Brute Force Attacks on WordPress Sites

photo credit: Eduardo Mueses The Oracle(license)

Security researchers at Wordfence are reporting that thousands of hacked home routers are attacking WordPress sites. Wordfence firewall and malware scanner products are in use on more than 2 million WordPress sites and the company estimates that 6.7% of all attacks on these sites are coming from hacked home routers.

“In the past month alone we have seen over 57,000 unique home routers being used to attack WordPress sites,” Wordfence CEO Mark Maunder said. “Those home networks are now being explored by hackers who have full access to them via the hacked home router. They can access workstations, mobile devices, wifi cameras, wifi climate control and any other devices that use the home WiFi network.”

Maunder said his team has mostly seen brute force attacks targeting both wp-login.php (the traditional login endpoint for WordPress) and also XMLRPC login. They have also seen a small percentage of complex attacks. Wordfence has detected a total of 67 million individual attacks from the routers the company identified in March.

While Wordfence researchers were creating their monthly attack report, they noticed that Algeria had jumped in rankings from position 60 to 24 in thier “Top Attacking Countries” list. Their review of attack data in Algeria revealed a ‘long tail’ of more than 10,000 attacking IPs originating from an Algerian state owned ISP.

A vulnerability known as “misfortune cookie” is being used in these attacks. It hijacks a service that ISP’s use to remotely manage home routers by listening on port number 7547. ISP’s should close general internet access to this port, but many have not.

“It appears that attackers have exploited home routers on Algeria’s state owned telecommunications network and are using the exploited routers to attack WordPress websites globally,” Maunder said.

Wordfence researchers scanned the devices to find out what services they are running and found that they are Zyxel routers usually used in a home internet setting. They found that many of them have a severe and well-known vulnerability in RomPager, the embedded web server from AllegroSoft.

“We then dug deeper and discovered that many ISPs around the world have this same issue and those routers are attacking WordPress sites via brute force attacks,” Maunder said.

I spoke with Tony Perez, CEO of Sucuri to see if his team has detected anything similar. Sucuri also tracks WordPress brute force attempts, but Perez said current numbers are not remarkable when compared historically to mid-2016.

“I think the reason Sucuri and other companies are not seeing this is because it is a weak ranking signal for malicious behavior,” Maunder said. “As we point out in the report, each of these IPs is only doing between 50 and 1000 attacks per month on sites. They also only attack for a few hours each. These combined are a very weak ranking signal for malicious behavior. That low frequency also makes the attacks more effective because they are less likely to be blocked.”

This particular security issue is unusual in that the vulnerability is with the routers, not with WordPress itself. The attackers bulk hack thousands of devices, upload a WordPress attack script and a list of targets, and then they have thousands of routers under their control to attack WordPress sites.

This type of botnet isn’t terribly uncommon, as security researchers from from ESET recently uncovered a new malware called Sathurbot that uses torrent files as a method of distributing coordinated brute-force attacks on WordPress sites. The vulnerability in this instance is not in the software but rather in weak WordPress administrator accounts.

Protecting against brute force attacks starts with a strong administrator password. There are also many popular plugins, such as Shield Security, the Jetpack Protect module, iThemes Security, and Wordfence, which offer protection from brute force attacks.

If you want to make sure your router is not vulnerable to being recruited for these attacks, Wordfence has created a tool that makes it easy to check. It detects whether your home router has port 7547 open or if it’s running a vulnerable version of RomPager. If you find that your router is vulnerable or port 7547 is open, Wordfence has published instructions for how to secure your device.

5 Comments


  1. I think it may be worth pointing out that despite the terminology employed by many of these companies in the WordPress security space, these technically aren’t “brute force” attacks. They are dictionary attacks of some form, which only target weak, commonly-used passwords. This is evidenced by the low volume of attempts from each of the pwned devices. A brute force attack would be an attempt to run every single possible password combination, up to a certain number of characters in length. This requires an unimaginably enormous volume of attempts, and as such, it is seldom, if ever, employed on the web. The time and resources needed to mount such an attack would not be worth it, at least not for attacks on random websites, only possibly in a targeted attack on a particular person/business/site. It is much easier just to run a dictionary attack with a few of the most common username/password combinations. Avoiding having your site exploited via a dictionary attack is as simple as using a strong password, and ideally also not using the “admin” username.
    Of course, raising awareness about insecure routers is certainly a good thing. It is sad to say that many routers are insecure and require maintenance on the part of average internet users, who have no idea about it. I’m thinking of purchasing a new router in the near future myself, and I’m hesitant to know which one to choose.

    Report


  2. My router is an Asus Cellspot router from T-Mobile and when I run the test it tells me I am save.

    Report


  3. I’ve had my site up for about a year and Jetpack Protect reports 23,022 malicious login attempts. Is this in the normal range or am I being targeted? I have also recently switched to using Cloudflare and it seems to have leveled off. Found out last night that my pops has Zyxel (from CenturyLink); I’ll have to check next time I’m there.

    Report


  4. I insisted to our ISP that we own and operate our own router: out of the blue, it attempted to add remote access without my consent during a maintenance visit. I refused as it potentially gave it access to our network devices, so the company installed its own router which we then wired into with our two routers. It gives us an added layer of protection, although of course the ISP router could still be compromised by a hacker if the company leaves open port 7547.

    Report


  5. Just two days ago, I came across a security plugin called CipherCoin, I am sure there are others such plugins available. These plugins are said to protect WordPress sites against such brute attacks by limiting number of login attempts by any unauthorized source.

    Report

Comments are closed.