You must Register or Sign in to your Cyware account to perform this action
×Once you are logged in, you will be able to:
Customize your feeds by selecting categories you like
Comment on or Like an article
Receive the latest security stories, trends, and insights in your inbox
Build your profile and login across multiple devices
Bookmark a story and read it later
- Home
- Hacker News
- Malware and Vulnerabilities
- WPML Plugin Hacked, Thousands Of Users Spammed

WPML Plugin Hacked, Thousands Of Users Spammed
WPML Plugin Hacked, Thousands Of Users Spammed- January 21, 2019
- |
- Malware and Vulnerabilities
/https://cystory-images.s3.amazonaws.com/shutterstock_273441785.jpg)
- WPML Plugin was reportedly hacked by a former employee, who also sent out spam emails to its users regarding the site’s security.
- WPML allows multilingual websites to work smoothly under WordPress.
WPML -- the plugin which supports multilingual websites in WordPress was hacked yesterday, said sources. Along with the breach, WPML users were sent spam emails regarding the site’s security.
WPML employee Amir Helzer said in a blog post that it was allegedly the work of a former employee. On the other hand, Helzer has mentioned that the attacker did not steal any confidential information such as login details and payment information.
Playing Smoke and Mirrors
A tweet by a WPML user showed the email’s message. At a glance, the attacker used the site’s mailer service to send emails and has cited ‘ridiculous security holes’ in the email. Also, the email advises users to stop using sensitive information and to make frequent backups.
It seems that the former employee/attacker took a dig at the company not providing a ‘100% hack proof” software, and criticized the site’s offerings such as its product plans and support service.
WPML fixes the site immediately
After many users reported this email, WPML responded with a fix by revamping the site. One of its employees Amir Helzer informed this in an official blog.
“We updated wpml.org, rebuilt everything and reinstalled everything. We secured access to the admin use 2-factor authentication and minimized the access that the web server has to the file system. These are more precautions than an actual response to the hack."
Moreover the official blog stated that, "Our data shows that the hacker used inside information (an old SSH password) and a hole that he left for himself while he was our employee. This hack was not done via an exploit in WordPress, WPML or another plugin, but using this inside information.”
- + Aware
Get such articles in your inbox
News
-
Previous News Russian programmer Alexander Zhukov extradited to the US
- January 21, 2019
- |
- Incident Response, Learnings
-
Next News ThreadX harbours serious bug, Billions of Wi-Fi enabled devices said to be affected
- January 21, 2019
- |
- Malware and Vulnerabilities
Popular News
Related News
Categories
Get such articles in your inbox
News
-
Previous News Russian programmer Alexander Zhukov extradited to the US
- January 21, 2019
- |
- Incident Response, Learnings
-
Next News ThreadX harbours serious bug, Billions of Wi-Fi enabled devices said to be affected
- January 21, 2019
- |
- Malware and Vulnerabilities
Popular News
Related News
Categories
