Author Topic: Insecure Word Press CMS - PHISHING...  (Read 911 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33895
  • malware fighter
Insecure Word Press CMS - PHISHING...
« on: September 22, 2017, 04:19:06 PM »
Re: WordPress Version
4.8.2
Version does not appear to be latest 4.8.1 - update now.

WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

homepage-pop-up   
http://www.magneticlab.ch/mlabpopup
easy-social-icons 3.0.5   latest release (3.0.5)
http://www.cybernetikz.com
easy-tables-vc   
js_composer   
language-icons-flags-switcher 2   latest release (2.1) Update required
http://www.webcraft.gr/muli
accesspress-social-icons 1.6.8   latest release (1.6.8)
https://accesspressthemes.com/wordpress-plugins/accesspress-social-icons/
all-in-one-seo-pack 2.3.16   latest release (2.3.16)
https://semperplugins.com/all-in-one-seo-pack-pro-version/
contact-form-7 4.9   latest release (4.9)
https://contactform7.com/
revslider   
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.


Grade A-A-E-C-F Grade status: https://observatory.mozilla.org/analyze.html?host=antalyaswimsuitweek.com#third

Other: https://observatory.mozilla.org/analyze.html?host=antalyaswimsuitweek.com#tls

F-Grade status and recommendations: https://observatory.mozilla.org/analyze.html?host=antalyaswimsuitweek.com#ssh

Retirable jQuery: http://retire.insecurity.today/#!/scan/2b2c43054c2a6be655691519b857d97cb678aff845e9313ec95e78b84b86e58e

MySQL (3306) port response...

CLEAN MX - phishing site
BitDefender - phishing site
Fortinet - phishing site
Blacklisted in b.barracudacentral.org

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!