Page Title: White Fir Design Blog

  • This webpage makes use of the TITLE meta tag - this is good for search engine optimization.

Page Description: An ongoing discussion of web design and web security.

  • This webpage makes use of the DESCRIPTION meta tag - this is good for search engine optimization.

Page Keywords:

  • This webpage DOES NOT make use of the KEYWORDS meta tag - whilst search engines nowadays do not put too much emphasis on this meta tag including them in your website does no harm.

Page Text: Hacker Impersonated GoDaddy When Hacking GoDaddy Hosted WordPress Websites While working on cleaning up a hacked WordPress website recently we found a hacker had tried to disguise some of what they were doing by making it seem like it was coming from GoDaddy. GoDaddy, possibly not coincidentally, was the web host for the hacked website we were dealing with. GD-Stats The first element of this we found was a malicious plugin with the slug gd-stats. If you were looking at the Installed Plugins page in the WordPress admin area, you would see this information for that plugin: That labels the plugin as being named GD-Stats and being from GoDaddy, Inc, though the link is to wordpress.com. The description is weird: Most leading CMS platforms like WordPress use Ajax in their architecture. In looking to see if others had encountered a malicious plugin with the same name, we found a topic on WordPress’ forum from early in February where someone else hosted with GoDaddy had run into this: This morning, I found that our WordPress website has been hacked by someone in Moscow. They uploaded the file “gd-stats.zip” then installed the plugin. Now when I go to our wordpress.org log in page, I put in my credentials, it takes me to a completely blank screen. When I went to our website, it doesn’t have the dashboard option available to log into. We’re hosted through GoDaddy. I’m waiting on their support team as well. In a follow up they wrote this: No it wasn’t Godaddy. It was from someone in Moscow who hacked our site at 4:30 AM. They installed the gd-stats.zip and the plug in but I finally got into our Godaddy account and deleted the plug in so we’re good now. There was a reply from someone else with the same plugin, but no mention of the web host of the affected website. For a hacker to add that plugin to the website they would already have to have access to the website in some way. In trying to determine what that was, we ran across a major problem, it appeared that GoDaddy had about a week before moved the website to a new cPanel account. That meant that among things, the last modified dates on malicious files were not meaningful, since it just listed the time of the move. It isn’t clear why that happened because of the partially unmanaged nature of the website at the time. Whatever was the case, the malicious plugin appeared to exist from before there was logging available that could have shed light on that. So we hit a dead end there. Users Table Another piece of the hack might help to further explain how the hack happened. In the WordPress database table storing the users of the website, _users, we found two non-legitimate Administrators accounts. Both accounts were listed as being listed as being registered at 0000-00-00 00:00:00, which shows that they were not created through the normal registration process, since if they were, the time they were registered would be there. Both of the accounts were also meant to look like they came from GoDaddy, with the usernames being: gd_support gd_sys_kafhi Curiously the email address for them doesn’t use a GoDaddy-like domain, instead opting for wordpress.org.com: gd_support@wordpress.org.com gd_sys_kafhi@wordpress.org.com Again we ran into a problem, since the logging isn’t available to see what it would show about how the hacker created those accounts. There are several routes that could have occurred through. They could have been added through a SQL injection vulnerability on the website that allowed for adding things to the database, but most SQL injection vulnerabilities don’t permit that type of action, so that seems unlikely. More likely would be that the hacker was able to get direct access to the database. That could be because of a security issue with the website, with the web host, or combination of the two. GoDaddy has had issues with improper security of database access, we posted about another hacked website where that came in to play in April . February Time Frame Looking at the session_tokens entries in the WordPress database’s _usermeta table, we found that one of those accounts was logged in to from a Russian IP address, 185.4.65.27, on February 4. That matches up with what was described in that WordPress forum topic. Notifying GoDaddy We are going to contact GoDaddy’s security team to let them know about this impersonation and maybe they can check if other websites they host still contain that plugin. Posted on

  • This webpage has 726 words which is between the recommended minimum of 250 words and the recommended maximum of 2500 words - GOOD WORK.

Header tags:

  • It appears that you are using header tags - this is a GOOD thing!

Spelling errors:

  • This webpage has 2 words which may be misspelt.

Possibly mis-spelt word: Godaddy

Suggestion: Go daddy
Suggestion: Go-daddy
Suggestion: Daddy
Suggestion: Goody

Possibly mis-spelt word: GoDaddy

Suggestion: Go Daddy
Suggestion: Go-daddy
Suggestion: Daddy
Suggestion: Goody

Broken links:

  • This webpage has 16 broken links.

Broken link URL:

https://www.whitefirdesign.com/about/privacy-policy.html
https://www.whitefirdesign.com/services/hacked-moodle-website-cleanup.html
https://www.whitefirdesign.com/services/
https://www.whitefirdesign.com/blog/2022/03/10/backups-made-with-wordpress-plugins-might-not-back-up-all-of-your-website/
https://www.whitefirdesign.com/blog/2022/03/23/a-malicious-file-in-your-wordpress-sites-uploads-directory-doesnt-necessarily-mean-it-is-infected/
https://www.whitefirdesign.com/blog/2021/07/21/do-you-need-to-worry-about-being-hacked-if-wordpress-is-warning-of-use-of-an-insecure-version-of-php/
https://www.whitefirdesign.com/blog/2022/03/09/latest-versions-of-moodle-contain-publicly-disclosed-authenticated-sql-injection-and-xss-vulnerabilities/
https://www.whitefirdesign.com/blog/2022/03/23/a-malicious-file-in-your-wordpress-sites-uploads-directory-doesnt-necessarily-mean-it-is-infected/
https://www.whitefirdesign.com/blog/2022/03/10/backups-made-with-wordpress-plugins-might-not-back-up-all-of-your-website/#respond
https://www.whitefirdesign.com/blog/tag/cpanel/
https://www.whitefirdesign.com/
https://www.whitefirdesign.com/blog/2022/03/23/a-malicious-file-in-your-wordpress-sites-uploads-directory-doesnt-necessarily-mean-it-is-infected/#respond
https://www.whitefirdesign.com/blog/2021/07/22/this-doesnt-inspire-confidence-in-cpanels-understanding-and-handling-of-security/
https://www.whitefirdesign.com/about/testimonials.html
https://www.whitefirdesign.com/blog/category/website-security/
https://www.whitefirdesign.com/blog/tag/portswigger/

Broken image links:

  • This webpage has no broken image links that we can detect - GOOD WORK.

CSS over tables for layout?:

  • It appears that this page uses DIVs for layout this is a GOOD thing!

Last modified date:

  • We were unable to detect what date this page was last modified

Images that are being re-sized:

  • This webpage has no images that are being re-sized by the browser - GOOD WORK.

Images that are being re-sized:

  • This webpage has no images that are missing their width and height - GOOD WORK.

Mobile friendly:

  • After testing this webpage it appears to be mobile friendly - this is a GOOD thing!

Links with no anchor text:

  • This webpage has no links that are missing anchor text - GOOD WORK.

W3C Validation:

Print friendly?:

  • It appears that the webpage does NOT use CSS stylesheets to provide print functionality - this is a BAD thing.

GZIP Compression enabled?:

  • It appears that the serrver does NOT have GZIP Compression enabled - this is a NOT a good thing!