Download your copy of the report (PDF, 723 KB)

Introduction


Internet technology is rapidly evolving making it much easier for both individuals and organizations to create websites and to upload their unique content in a blaze. Content Management Systems (CMS), Website in a Click services, shared hosting, and other services allow to get online almost with no effort and with minimum budget. And with the Internet of things (IoT) in the doorway, nearly every aspect of the business and personal life gets connected to the web to communicate, merchandise, exchange, provide service, etc.

On the other hand, the more data is there, - the more profit can online criminals potentially gain if they can access it illegally. Malware industry is building powerful back-end infrastructure to launch sophisticated malicious campaigns and by-pass the detection mechanisms. Online security and malware protection are the essential components of the reputable and safe business. Hence, to keep up with the pace, malware research and forensics platforms are required to process an enormous amount of data non-stop to prepare tools and methods capable of identifying and removing every new infection types and variants.

CVE Per CMS Platform


In 2016 the following vulnerabilities have been filed against top 6 Content Management Systems (CMS):

Annual Website Malware Report 2016 | Quttera

The 2016 Year Website Malware in Details | Q1 – Q4


The table below is the overall detection statistics per the threat type.

Annual Website Malware Report 2016 | Quttera

TOP 10 Online Threats

Annual Website Malware Report 2016 | Quttera

Website Severity Report


Currently, we assign severity status to a scanned domain / URL based on the detected components and their level of maliciousness to a website visitor. Ranging from Potentially Suspicious to Malicious these groups allow to estimate the immediate danger that the detected code imposes and the possibility of the False Positive. The data in this report applies to the defined/limited sample and it has been checked and verified both manually and using automated tools.

Annual Website Malware Report 2016 | Quttera

Blacklisting Report


Almost each search engine provider and security vendor manage blacklisting mechanisms. It is used to protect the customer and block the dangerous content from being accessed. In this section, we compared the blacklisting coverage against the active threat on the processed website.

Annual Website Malware Report 2016 | Quttera

Hacking Report


The data in this section is based on the malware investigation and removal from the customers’ websites during the year 2016.

CMS Analysis

Leading platforms among the infected websites that use Content Management System (CMS) were WordPress (WP), Joomla! and Magento.

Annual Website Malware Report 2016 | Quttera

One of the common reasons of the hacking and, especially, the re-infection is the exploitation of the vulnerable and outdated version of the software and components such as plugins, themes, templates modules and other third-party components. The same applies to the CMS installations. Below are insights on the versions of the CMS as detected by our researchers at the time the website was already compromised.

Annual Website Malware Report 2016 | Quttera

Malware Incidents Insight

In this section, we outline some of the various exploitation vectors and malware types that were detected by our tools and removed by the incident response team during 2016.

SUPEE-5344

Magento based websites compromised due to the vulnerability in the installed version of the CMS.A remote code execution (RCE) vulnerability known as the “shoplift bug” that allowed hackers to obtain Admin access to a store.

More info: https://magento.com/security/patches/supee-5344---shoplift-bug-patch

SUPEE-5994

Magento based websites compromised due to one or more vulnerabilities in the installed version of the CMS.

More info: https://magento.com/security/patches/supee-5994

SUPEE-6285

Magento based websites compromised due to one or more vulnerabilities in the installed version of the CMS.

More info: https://magento.com/security/patches/supee-6285

SUPEE-6482

Magento based websites compromised due to one or more vulnerabilities in the installed version of the CMS.

More info: https://magento.com/security/patches/supee-6482

SUPEE-6788

Magento based websites compromised due to one or more vulnerabilities in the installed version of the CMS.

More info: https://magento.com/security/patches/supee-6788

Culprit bot network

Website was a part of the Culprit bot network.

FilesMan infection

Website infected with the FilesMan backdoor malware that allows hacker to access and modify compromised site.

More info:
  • https://blog.quttera.com/post/filesman-backdoor-malware-on-your-computer/
  • https://blog.quttera.com/post/deobfuscation-made-easy-with-malware-decoder/
Ultimate VC Add-ons

Infection planted into the plugin files (Trojan and others) allowed hackers to send Spam and distribute infection.

SPAM

Among the other Spam campaigns occurred in 2016 these two stand out for their scale and ability to survive the standard security measures:

  • Self-Recovering Spam Bot (more info: https://blog.quttera.com/post/self-recovering-spam- bot-launched-exploitation-from-entire-ip-sub-network/)
  • Self-Recovering Black SEO & Spam Targeting WordPress (more info: https://blog.quttera.com/post/self-recovering-black-seo-spam-infection-hits-wordpress-setups/)

CVE-2015-8526

Joomla! vulnerability that allowed remote attackers to conduct PHP object injection and execute arbitrary PHP code via the HTTP.

More info: https://www.cvedetails.com/cve/CVE-2015-8562/#metasploit

Ransomware

Website infected with the Win32/Wadhrama.A ransoware infection

More info: https://blog.quttera.com/post/instant-ransomware-for-unpatched-websites/

Summary

The data in this report has been carefully checked and verified to give you the numerical insights on the scale of the infection being spread through the websites. We are working closely with hosting companies, security vendors and website management companies to help webmasters running safe and malware-free sites.

Download your copy of the report (PDF, 723 KB)

Report incorrect detection or false positive on helpdesk.quttera.com or send an email to support@quttera.com

Malware cleanup and black list removal


Quttera Offers Free, Simple SSL Management for ThreatSign Usersn | Quttera

Blog: Quttera Offers Free, Simple SSL Management for ThreatSign Users

These days, maintaining an SSL certificate without letting it lapse is vital. The Quttera ThreatSign DNS WAF protects you against a broad range of threats and offers you free SSL management.

READ MORE

Using Quttera Web Malware Scanner Plugin to Clear WordPress Malware | Quttera

Blog: Using Quttera Web Malware Scanner Plugin to Clear WordPress Malware

The popularity of WordPress also makes it a target for attacks. Here’s how you can detect and clear WordPress malware with the Quttera Web Malware Scanner plugin.

READ MORE

Q1 2020 Quttera Web Application Firewall Statistics
 | Quttera

Blog: Q1 2020 Quttera Web Application Firewall Statistics

The Quttera Web Application Firewall guards your site against many kinds of cyberattacks, including ones that haven’t been seen yet. Here’s a look at Quttera’s Q1 2020 WAF statistics.

READ MORE



© 2023 Quttera Ltd. All rights reserved.