• Hello,
    a friend wrote me recently that his wordpress security plugin send him a strange mail. He keeps his wordpress generally updated.

    From Sucuri Plugin:

    ====================================
    Subject: Post Update

    Login Info:
    Time: 20. M?rz, 2019 1:19 pm

    Website Info:
    Site:
    IP Address:

    Notification:
    Post was updated; identifier: 1195; name: Vuln!! Path it now!!
    ====================================

    So he asked me if I knew something about that. When I search the web, I only find infected websites with the same ‘post update’. No information about the problem.

    He installed a backup. His site is and was updated.

    Can someone point me to more information about that problem? I would like to prevent that something like that happens to my blog.

    Thanks
    Daniel

Viewing 3 replies - 1 through 3 (of 3 total)
  • Hello,

    The text Vuln!! Path it now!! is simply the title of a post that someone created in that website. If your friend searches a post with the ID 1195, they will be able to find the post or page with the suspicious content. They can visit the page using this link [1] where “example.com” is obviously their real website.

    Also, you should know that some plugins use the same posts table to store data. It is possible that your friend installed a plugin that allows people to submit text, for example, a contact form, feedback page, or something similar. The plugin has no way to distinguish them other than using the “post_type”.

    He installed a backup. His site is and was updated.

    Considering this, the post may not exist anymore, and they will not be able to investigate further. Having a copy of the database after the alert was sent would be helpful. But if they already installed a backup, from before the event was triggered, then —unfortunately— there is nothing to investigate.

    Let me know if you need more information.

    [1] https://example.com/?p=1195

    Hi!

    I’m the one he’s talking about ?? I actually have a backup of the database after the attack (created by UdraftPlus). I’ve searched the DB dump for the “Vuln XXX” string above but couldn’t find anything. Also, the post with ID 1195 has not been modified. Everything looked like before the attack. I restored the website to a clean state, just to make sure… The attack repeated a day later and since then I’m blocking the IP range it came from.

    Is it possible that Sucuri sents these “Post Update” warnings when someone *tries* to update a post but actually fails to do so? That would at least make sense in this case…

    Here’s an example of a page where the attack succeeded: https://www.evesca.com/x-htm/

    Hello @weepee,

    Let’s take a look…

    Is it possible that Sucuri sents these “Post Update” warnings when someone *tries* to update a post but actually fails to do so?

    No, according to the code, the actions mentioned above can be executed from anywhere in the code (from a plugin, theme, or even a small script), however, the action simply passes the ID of the post to the Sucuri plugin, then the plugin searches the post in the database, and uses this data to write the message for the email alert.

    It may be worth checking the access logs of your website to see what requests match the IP address reported in the email. It is possible that you can find more information there to explain how the attacker was able to trigger the email alert, even though —as you said— the post appears untouched in the database.

Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘Vuln!! Path it now!!’ is closed to new replies.