WordPress, Joomla or Drupal; CMS security

Over one third of all webpages on the Internet are powered by one of these four key open source platforms: WordPress, Joomla, Drupal, and Magento.

This makes life of hackers much easier as they can simply focus on exploiting vulnerabilities on a platform of them, or one of the most popular plugins and extensions they use.CMS WordPress

Sucuri, a security company focused on detecting online attacks and restoring compromised websites, recently launched statistics on hacked websites.

Based on Incident Response Team reports and Research Team of the company, in the first quarter of this year, 78% of successful compromises were on websites with WordPress. Websites using Joomla reached 14%, Magento 5%, and Drupal 2%.

E-commerce sites using Magento were hit with exploits that allowed remote code execution in February 2015, and an XSS hole that can lead to of the online store in January 2016. Obviously, not all admins update their installations regularly.

In fact, webmasters with Magento are the worst of their kind: 97% of Magento installations, according to Sucuri experts, were old versions at the time of cleaning. WordPress admins on the other hand were better, since "only" 56 percent of the installations were in an older version:WordPress juice-cleanup-stats

"The top three software vulnerabilities that affected most websites in the first quarter were through the RevSlider, GravityForms and TimThumb plugins," the researchers said.

"For all three of these plugins there was a fix available for at least a year, while for TimThumb it existed many years ago (since 2011).

The problem with RevSlider, in particular, is that it is built into WES themes, and many of the platform users do not even know they use it.

Magento websites are usually infringed by information leaked to customers.

For the remaining platforms, SEO Spam (31%, and this percentage continues to increase), drive-by-download infections (60%), tools (exploit or DDoS tools), and phishing. Defacements by hacktivists were barely noticed.

In two-thirds of cases, Sucuri's cleaning team discovered backdoors on websites, as attackers wanted to be confident that they could gain access after cleaning the hacked site.

"On average, we clean up 132 files per hacked website," say the researchers.

"This shows how deeply embedded it can be software within a website. The above also explains why Google reports a 30% re-infection rate, a rate measured through webmaster tools.”

Here we have to mention that WordPress sites, although they first come in the rate of infections for us can be considered the most reliable. Of course, always be in the latest update.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).