WordPress, Joomla or Drupal; CMS security

Over a third of all websites on the Internet are powered by one of these four main ones open : WordPress, Joomla, Drupal and Magento.

This makes life of hackers much easier as they can simply focus on exploiting vulnerabilities on a platform of them, or one of the most popular plugins and extensions they use.CMS WordPress

Sucuri, a security company that focuses on detecting web attacks and restoring broken websites, has recently released fresh statistics on hacked websites.

Based on Incident Response Team and Malware Research Team reports in the first quarter of this year, 78% of successful compromises were on WordPress sites. Sites using Joomla reached 14%, Magento on 5%, and Drupal an 2%.

Magento's e-commerce sites were hit with exploits that allowed remote code execution in February of 2015, and an XSS hole that could lead to a violation of the online store in January of 2016. Apparently, not all administrators regularly update their installations.

In fact, webmasters with Magento are the worst of their kind: 97% of Magento installations, according to Sucuri experts, were old versions at the time of cleaning. WordPress admins on the other hand were better, since "only" 56 percent of the installations were in an older version:WordPress juice-cleanup-stats

"The top three software vulnerabilities that affected most websites in the first quarter were through the RevSlider, GravityForms and TimThumb plugins," the researchers said.

"For all three of these plugins there was a fix available for at least a year, while for TimThumb it existed many years ago (since 2011).

The with RevSlider, in particular, is that it's built into WP themes, and many of the platform's users don't even know they're using it.

Magento websites are usually infringed by information leaked to customers.

For the other platforms, SEO Spam (31%, and this percentage continues to grow), drive-by-download infections (60%), hacking tools (DDoS exploit or tools) and phishing are commonly used. The defacements of the activists were scarcely observed.

In two-thirds of the cases, Sucuri's cleaning team found out on the websites, as the attackers wanted to be sure, that they can gain access even after cleaning the hacked website.

"On average, we clean up 132 files per hacked website," say the researchers.

"This shows how deeply embedded it can be within a website. The above also explains why Google reports a 30% re-infection rate, a rate measured through webmaster tools.”

Here we have to mention that WordPress sites, although they first come in the rate of infections for us can be considered the most reliable. Of course, always be in the latest update.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).