• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

New GoTrim botnet brute forces WordPress site admin accounts

Bill Toulas by Bill Toulas
December 13, 2022
Reading Time: 3 mins read
0
New GoTrim botnet brute forces WordPress site admin accounts

Wordpress

RELATED POSTS

New Horabot campaign takes over victim’s Gmail, Outlook accounts

Windows 11 will let you view phone photos in File Explorer

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

A new Go-based botnet malware named ‘GoTrim’ is scanning the web for self-hosted WordPress websites and attempting to brute force the administrator’s password and take control of the site.

This compromise may lead to malware deployment, injection of credit card stealing scripts, hosting of phishing pages, and other attack scenarios, potentially impacting millions depending on the popularity of the breached sites.

The botnet is notorious in the cybercrime underground, but Fortinet became the first cybersecurity firm to analyze it, reporting that while the malware is still a work in progress, it already has potent capabilities.

GoTrim botnet targets WordPress sites

The GoTrim malware campaign spotted by Fortinet started in September 2022 and is still ongoing.

The malware’s operators feed a long list of target websites and a set of credentials to the botnet network. The malware then connects to each site and attempts to brute-force the admin accounts using the inputted credentials.

If successful, GoTrim logs in on the breached site and reports the new infection to the command and control server (C2), including a bot ID in the form of a newly generated MD5 hash.

Buy JNews
ADVERTISEMENT

Next, the malware uses PHP scripts to fetch GoTrim bot clients from a hardcoded URL and deletes both the script and the brute-forcing component from the infected system, as these are no longer needed.

The botnet can operate in two modes: “client” and “server.” 

In client mode, the malware will initiate the connection to the botnet’s C2, while in server mode, it starts an HTTP server and awaits incoming requests from the C2.

GoTrim botnet attack chain
GoTrim botnet attack chain (Fortinet)

If the breached endpoint is directly connected to the internet, then GoTrim defaults to server mode.

GoTrim sends beacon requests to C2 every couple of minutes, and if it fails to receive a response after 100 retries, it terminates.

The C2 can send encrypted commands to the GoTrim bot, which supports the following:

  • Validate provided credentials against WordPress domains
  • Validate provided credentials against Joomla! domains (not implemented)
  • Validate provided credentials against OpenCart domains
  • Validate provided credentials against Data Life Engine domains (not implemented)
  • Detect WordPress, Joomla!, OpenCart, or Data Life Engine CMS installation on the domain
  • Terminate the malware
C2 response containing command payload
C2 response containing command for botnet (Fortinet)

Evading detection

To evade detection by the WordPress security team, GoTrim will not target sites hosted on WordPress.com and instead only target self-hosted sites.

This is done by checking the ‘Referer’ HTTP header for “wordpress.com,” and if detected, stops targeting the site.

“As managed WordPress hosting providers, such as wordpress.com, usually implement more security measures to monitor, detect, and block brute forcing attempts than self-hosted WordPress websites, the chance of success is not worth the risk of getting discovered,” explains the researchers.

Moreover, GoTrim mimics legitimate Firefox on 64-bit Windows requests to bypass anti-bot protections.

Finally, if the targeted WordPress site uses a CAPTCHA plugin to stop bots, the malware detects it and loads the corresponding solver. Currently, it supports seven popular plugins.

Fortinet also said that the GoTrim botnet avoids sites hosted at “1gb.ru,” but could not determine the exact reasons for doing so.

To mitigate the GoTrim threat, WordPress site owners should use strong administrator account passwords that are hard to brute-force or use a 2FA plugin.

Finally, WordPress admins should upgrade the base CMS software and all active plugins on the site to the latest available version, which addresses known vulnerabilities that hackers can leverage for initial compromise.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Beware: Hackers now use OneNote attachments to spread malware
Cyber Security

New Horabot campaign takes over victim’s Gmail, Outlook accounts

June 1, 2023
Windows 11 will let you view phone photos in File Explorer
Cyber Security

Windows 11 will let you view phone photos in File Explorer

June 1, 2023
Latitude cyberattack leads to data theft at two service providers
Cyber Security

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

June 1, 2023
Apple fixes recently disclosed zero-days on older iPhones and iPads
Cyber Security

Russia says US hacked thousands of iPhones in iOS zero-click attacks

June 1, 2023
Hackers turn to Google search ads to push info-stealing malware
Cyber Security

Google triples rewards for Chrome sandbox escape chain exploits

June 1, 2023
OSV and the Vulnerability Life Cycle
Cyber Security

Announcing the Chrome Browser Full Chain Exploit Bonus

June 1, 2023

Recommended Stories

Litecoin [LTC] retests recent price floor; here’s where you can enter

Litecoin [LTC] retests recent price floor; here’s where you can enter

May 2, 2023
How will Binance’s struggles to find banking partner in the U.S. impact BNB

How will Binance’s struggles to find banking partner in the U.S. impact BNB

April 9, 2023
As MATIC inflicts a breakout, can it sustain the momentum

As MATIC inflicts a breakout, can it sustain the momentum

May 18, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • How Ethereum’s falling gas fees affect the network
  • Here’s what Solana can expect next
  • XRP traders, know this about the ‘golden pocket’

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?