Endpoint

7/12/2018
06:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

WordPress Sites Targeted in World Cup-Themed Spam Scam

Spammers using a 'spray & pray' approach to post comments on WordPress powered blogs, forums, says Imperva.

WordPress-powered websites are being targeted in a comment spam campaign designed to get users to click on links to sites offering betting services on the 2018 FIFA World Cup games.

Security vendor Imperva recently observed a botnet spewing out meaningless text messages generated from a template to comments sections in blogs, news articles, and other sites that allow people to comment.

The spambot has been attempting to post comments to the same Uniform Resource Identifier (URI) across different WordPress sites indiscriminately and without regard for whether the site is vulnerable or even has a comments section.

The template that is being used to generate the messages has been around since at least 2013 and essentially gives spammers an automated way to craft slightly different versions of the same message. For example, one version of a message generated via the template might begin with 'I have been surfing online more than 2 hours today, yet I never found an interesting article like yours'. Another version might say, 'I have been browsing online more than three hours today, yet I never found an interesting article like yours.'

"Our analysis found that the top 10 links advertised by the botnet lead to World Cup betting sites," Imperva said in its report on the campaign. "Interestingly, eight of the top advertised sites contained links to the same betting site, hinting that they might be connected in a way."

The botnet itself is comprised of some 1,200 unique IPs, which by today's measures is not especially large. In many cases that Imperva analyzed, the botnet has been using URL-shortening, URL redirection, and other techniques to try and hide the destination of advertised links in its spam messages.

In the weeks leading up to the World Cup, the botnet was being used in remote code execution attacks and other attacks on WordPress sites. But once the games started, the botnet's main activity shifted to comment spam. This suggests that the botnet is available for hire and that the betting site being advertised via the current spam campaign are the ones paying for it, says Johnathan Azaria, security researcher at Imperva.

"Either the owners, or someone that benefits directly from the increased traffic via an affiliate program, for example," looks to be behind the campaign he says.

Comment spam — like other forms of spam — has been around for a long time, but continues to be popular among threat actors because of how effective they are in delivering marketing messages or links to websites via comments on online forums.

WordPress itself has called comment spam a "fact of life" for anyone with a blog and has offered numerous tips and links on how to mitigate the issue.

The most common approaches have been to blacklist IPs sending spams messages and also the URLs that they advertise. Plug-ins are readily available for vetting comment submissions and ensuring comments and posts are not being generated by a spambot.

"Numerous solutions exist for comment spam," Azaria says. "In some cases, a simple plugin will suffice. In others, a more complex solution is required such as a WAF, Captcha, [or a] bot detection and classification [tool]," he says.

Related Content:

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
pokerdominoqq
50%
50%
pokerdominoqq,
User Rank: Apprentice
7/15/2018 | 2:27:01 PM
pokerdominoqq
very nice
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.