<node id="660600">
  <nid>660600</nid>
  <type>news</type>
  <uid>
    <user id="36253"><![CDATA[36253]]></user>
  </uid>
  <created>1661533143</created>
  <changed>1661960207</changed>
  <title><![CDATA[Eight-Year Study Shows the Dark Side of WordPress Plugins]]></title>
  <body><![CDATA[<p>A new look into the world of WordPress plugins is showing scientists that this basic component of website development is a minefield full of malware and danger.</p>

<p>Since 2012 researchers in the Georgia Tech Cyber Forensics Innovation Laboratory (CyFI Lab) have uncovered 47,337 malicious plugins across 24,931 unique WordPress websites through a web development tool they named YODA.</p>

<p>According to a newly released paper about the eight-year study, the researchers found that every compromised website in their dataset had two or more infected plugins. The findings also indicated that 94% of those plugins are still actively infected.</p>

<p>&ldquo;This is an under-explored space,&rdquo; said Ph.D. student <strong>Ranjita Pai Kasturi</strong> who was the lead researcher on the project. &ldquo;Attackers do not try very hard to hide their tracks and often rightly assume that website owners will not find them.&rdquo;</p>

<p>YODA is not only able to detect active malware in plugins, but it can also trace the malicious software back to its source. This allowed the researchers to determine that these malicious plugins were either sold on the open market or distributed from pirating sites, injected into the website by exploiting a vulnerability, or in most cases, infected after the plugin was added to a website.</p>

<p>According to the paper written by Kasturi and her colleagues, over 40,000 plugins in their dataset were shown to have been infected after they were deployed. The team found that the malware would attack other plugins on the site to spread the infection.</p>

<p>&ldquo;These infections were a result of two scenarios. The first is cross-plugin infection, in which case a particular plugin developer cannot do much,&rdquo; said Kasturi. &ldquo;Or it was infected by exploiting existing plugin vulnerabilities. To fix this, plugin developers can scan for vulnerabilities before releasing their plugins for public use.&rdquo;</p>

<p>Although these malicious plugins can be damaging, Kasturi adds that it&rsquo;s not too late to save a website that has a compromised plugin. Website owners can purge malicious plugins entirely from their websites and reinstall a malware free version that has been scanned for vulnerabilities. To give web developers an edge over this problem, the CyFI Lab has made the YODA code available to the public on <a href="https://github.com/CyFI-Lab-Public/YODA">GitHub</a>.</p>

<p><em><a href="https://www.usenix.org/system/files/sec22-kasturi.pdf">Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces</a></em>, was presented at the 31st USENIX Security Symposium. The paper was written by Ph.D. students Kasturi, <strong>Jonathan Fuller</strong>, and <strong>Yiting Sun</strong>;&nbsp;master&#39;s student <strong>Omar Chabklo</strong>, undergraduate <strong>Andres Rodriguez</strong>, Postdoctoral Scholar&nbsp;<strong>Jeman Park</strong>, and Assistant Professor <strong>Brendan Saltaformaggio</strong>. The project was the&nbsp;result of the unique partnership between the School of Cybersecurity and Privacy and the School of Electrical and Computer Engineering.&nbsp;</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2022-08-26T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Cybersecurity researchers discover many WordPress sites are compromised ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="660599">
            <nid>660599</nid>
            <type>image</type>
            <title><![CDATA[CyFI Lab Sign]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>250302</fid>
                  <filename><![CDATA[SCP August 2022-66.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/SCP%20August%202022-66.png]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/SCP%20August%202022-66.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Sign reading Cyber Forensics Innovation Laboratory The CyFI Lab]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jpopham3@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
          <term tid="39501"><![CDATA[People and Technology]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>365</tid>
        <value><![CDATA[Research]]></value>
      </item>
          <item>
        <tid>1328</tid>
        <value><![CDATA[laboratory]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>7772</tid>
        <value><![CDATA[malware]]></value>
      </item>
          <item>
        <tid>167058</tid>
        <value><![CDATA[Student]]></value>
      </item>
          <item>
        <tid>1096</tid>
        <value><![CDATA[Ph.D.]]></value>
      </item>
          <item>
        <tid>191181</tid>
        <value><![CDATA[USENIX]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
