50,000 Websites Hacked Through Critical WordPress Vulnerability.

Over 50,000 websites have been compromised within the first three weeks following the disclosure of a critical vulnerability in the MailPoet plugin (formerly known as Wysija Newsletter) for WordPress.

The vulnerability allows the attacker to upload any content including PHP script files to the server without authentication. Successful exploitation of the vulnerability allows the attacker to execute code on the WordPress system and take complete control of the website.

The popularity of the plugin (over 1.7 million downloads) has attracted the attention of Malware authors who have already seized the opportunity to create a worm designed to propagate via vulnerable WordPress systems [1].

The initial patch for the vulnerability failed to correctly fix the problem, therefore we recommend that users of the software apply the 2.6.9 update, even if patches were applied following the initial disclosure.

Scanning WordPress with AppCheck NG

The AppCheck NG system has a dedicated WordPress module designed to identify vulnerable plugins and configuration weaknesses.

Sign up now for a free trial to scan your web sites and application; Register HERE

Download Appcheck NG Brochure; Brochure Download

Download Appcheck NG Sample Report; Example Appcheck NG Webscan

Exploit

An exploit for the vulnerability has been published for the Metasploit Framework; Exploit Link

References

[1] Malware Infection; link

[2] Original Advisory; link

Posted in Uncategorized | Comments Off on 50,000 Websites Hacked Through Critical WordPress Vulnerability.

Sec-1 Confirmed as CREST ‘Cyber Essentials’ Certifying Body

We are pleased to announce that Sec-1 is certified by CREST to provide services under the “Cyber Essentials” scheme, a government-backed, industry supported initiative to help organisations protect themselves against common cyber attacks.

Continue reading

Posted in News | Tagged , , , | Comments Off on Sec-1 Confirmed as CREST ‘Cyber Essentials’ Certifying Body

Apache Struts vulnerability – use AppCheck NG to discover if you are affected.

Appcheck NG Scan Sign-up

Background

Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model–view–controller (MVC) architecture.

On April 24th the Apache Struts project released an advisory for a remote code execution vulnerability affecting all versions of Struts between 2.0.0 and 2.3.16.1. Struts 2.3.16.2 (the latest release) is not vulnerable.

http://struts.apache.org/announce.html

What does the flaw allow the attacker to achieve?

The vulnerability allows the attacker to gain remote code execution on the affected server, effectively providing the attacker with an interactive command shell which can be used to pivot onto corporate networks from externally facing webservers.
Continue reading

Posted in Advisories, News | Comments Off on Apache Struts vulnerability – use AppCheck NG to discover if you are affected.

AppCheck NG updated to discover Critical OpenSSL bug “Heartbleed”

UPDATE (11/04/2014):  Proof of Concept exploit module added to Appcheck NG: Screenshot

On 7th April 2014 a group of security researchers disclosed a critical security flaw in the popular cryptographic software library OpenSSL.

The Heartbleed Bug allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

OpenSSL is the most popular open source library for providing encrypted SSL communications on the Internet and therefore there is a high chance that this flaw will affect your network and applications.

The Sec-1 AppCheck NG Web Application and Infrastructure vulnerability scanner has already been updated with a plugin to detect the flaw.

Continue reading

Posted in Advisories, News | Tagged , , , | Comments Off on AppCheck NG updated to discover Critical OpenSSL bug “Heartbleed”

Insider Security Threats: Reducing The Risks

A high-profile news article published last week brought the risk of insider threats from current or disgruntled employees to reality. A high profile retailer suffered the loss of thousands of employee data records at the hands of an employee who has since been arrested.

This real life example and the exposure of this attack has propelled this type of threat to the forefront with a recent study by Sec-1 partner, Imperva, identifying that 70% of employees admit to accessing data which they shouldn’t.

Continue reading

Posted in News, White Papers | Tagged , , , , , , | Comments Off on Insider Security Threats: Reducing The Risks

ShareCheck Windows Enumeration Tool v2.0

Sec-1 ShareCheck

The Sec-1 ShareCheck tool was designed for use during penetration tests against Microsoft Windows based networks. The aim of ShareCheck is to quickly identify configuration vulnerabilities that could be exploited to gain unauthorised access to systems and data without using aggressive exploit techniques.

ShareCheck helps identify the following vulnerabilities:
Continue reading

Posted in Tools | Leave a comment