Over a period of just a few days in late May, malicious actors attempted to steal database credentials from millions of WordPress websites by exploiting known vulnerabilities in themes and plugins.
According to WordPress security company Defiant, its firewall blocked more than 130 million attempts to collect database credentials from 1.3 million sites between May 29 and May 31. The number of requests peaked on May 30, when 75% of the total exploit attempts were observed by the company. After May 31, the attack volume dropped to what the firm usually sees.
Defiant told SecurityWeek that these attacks impacted over one-third of its customers and the company believes that the total number of websites targeted in this campaign is likely upwards of 10 million.
The attackers apparently exploited theme and plugin vulnerabilities that allow them to download or export files. Specifically, they tried to download the wp-config.php configuration file from WordPress websites. This file contains, among other pieces of information, the username and password that can be used to access a WordPress site’s database, which stores content and information on users.
An analysis of the attack showed that exploitation attempts originated from more than 20,000 IP addresses, the same IPs that were behind another recent large-scale campaign that targeted 1.3 million WordPress websites protected by Defiant’s Wordfence solution. The goal of that attack was to inject malicious JavaScript code into vulnerable websites in order to redirect their visitors to malvertising sites.
Defiant believes the two campaigns were launched by the same threat actor as they used mostly the same IPs and both exploited known vulnerabilities in themes and plugins. However, the more recent attack targeted nearly one million websites that were not targeted in the previous operation.
The company has published indicators of compromise (IoC) and provided recommendations on how administrators can protect their WordPress websites against such attacks.
Related: WordPress Websites Hacked via Vulnerabilities in Two Themes Plugins
Related: Elementor Plugin Vulnerabilities Exploited to Hack WordPress Sites
Related: Vulnerabilities in ‘Page Builder’ Plugin Expose 1 Million WordPress Websites

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
