Hackers Steal Over 390,000 Credentials in Deceptive WordPress Attack Targeting Security Researchers

Listen to this Post

2024-12-14

Security researchers have uncovered a large-scale campaign targeting security professionals and threat actors, leading to the theft of over 390,000 credentials, believed to be for WordPress accounts. This year-long attack, orchestrated by a group known as MUT-1244, employed deceptive tactics to compromise unsuspecting victims, including security researchers, penetration testers, and even malicious actors themselves.

Deception at the Core

MUT-1244 launched their attack using a two-pronged approach: phishing emails and trojanized repositories on GitHub. The phishing emails disguised themselves as legitimate kernel updates, tricking victims into installing malware.

Meanwhile, on GitHub, MUT-1244 created fake repositories that appeared to offer proof-of-concept (PoC) exploits for known vulnerabilities. These repositories looked legitimate, even appearing in trusted threat intelligence feeds, increasing their credibility.

Security professionals and attackers alike, seeking exploit code, unknowingly downloaded and ran the malware hidden within these fake repositories. This allowed MUT-1244 to steal not only WordPress credentials but also sensitive information like SSH private keys and AWS access keys from the compromised systems.

Beyond WordPress Credentials

The stolen data extends far beyond WordPress logins. Researchers believe the attackers targeted security professionals specifically, aiming to access valuable research data, internal networks, or even exploit these stolen credentials for further attacks.

The malware deployed by MUT-1244 not only steals data but also establishes a backdoor on the infected system, allowing for remote access and continued data exfiltration. This backdoor also facilitated the theft of cryptocurrency mining tools, allowing the attackers to potentially utilize compromised systems for their own financial gain.

What Undercode Says:

This attack by MUT-1244 highlights a concerning trend of cybercriminals targeting security professionals themselves. This tactic exploits the trust within the cybersecurity community, where threat actors can appear legitimate by mimicking established resources like PoC repositories.

Here are some key takeaways for security professionals:

Be cautious of unexpected updates or unfamiliar repositories on GitHub. Verify the source and legitimacy of any exploit code before downloading.
Do not readily trust emails, even if they appear to come from a trusted source. Verify the sender’s address and be wary of suspicious attachments or links.
Maintain strong security hygiene. Use multi-factor authentication and keep software updated with the latest security patches.
Be aware of social engineering tactics. Cybercriminals may attempt to leverage your expertise by presenting seemingly technical tasks or information.

By staying vigilant and implementing these security best practices, security professionals can better protect themselves and their valuable data from sophisticated attacks like the one employed by MUT-1244.

References:

Reported By: Bleepingcomputer.com
https://www.instagram.com
Wikipedia: https://www.wikipedia.org
Undercode AI: https://ai.undercodetesting.com

Image Source:

OpenAI: https://craiyon.com
Undercode AI DI v2: https://ai.undercode.helpFeatured Image