Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Your Backups Might Be Your Greatest Weakness
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > IT Security > Your Backups Might Be Your Greatest Weakness
IT Security

Your Backups Might Be Your Greatest Weakness

Editorial Desk
Last updated: November 30, 2022 6:50 am
Editorial Desk
Share
SHARE

Configuration files are a great resource for maintaining a website with ease, but they are also a common resource for malicious actors.

Developers and website operators benefit from configuration files by avoiding the need to hard code or manually enter connection details, which would otherwise be required in a world without configuration files.

It would be cumbersome to find exactly where configuration details are kept, and to update all instances of reusable data. There would also be code bloat and possible performance issues. Even just changing a website would be a difficult task.

Configuration Backup Probing

Wordfence has detected 70,408,576 attempts to locate wp-config.php file backups in the last 30 days. This is so common that Wordfence’s firewall detected it.

For instance, the search phrase inurl:wp-config.php intext:DB_PASSWORD will return results for files containing wp-config.php within the URL that also contain DB_PASSWORD in the body of the file that loads.

Malicious actors often use scripts and prebuilt tools to automate the process of finding backup configuration files. Using some form of automation to find these files makes the process much more efficient.

 Probe Attemps  - WordFence
Image – Probe Attemps – WordFence

Wordfence found four legitimate uptime scanners that were detecting this file in this data. The issue with these scanners is that they are inexpensive and two of them offer free versions.

There is no justifiable reason to scan for wp-config.php backups, so malicious actors have concluded that the resources required to use these scanners are outweighed by the advantages of using a recognised legitimate solution for nefarious purposes.

A little over 6.5 million wp-config.php file backups are located using these scanners.

Here are the top ten IP addresses wordfence have blocked from probing for wp-config.php backups.

  • 3.69.53.252 with 3953193 attempts
  • 3.71.111.191 with 2165519 attempts
  • 52.59.9.15 with 1726745 attempts
  • 35.83.251.89 with 1707670 attempts
  • 3.96.219.221 with 1645568 attempts
  • 35.182.107.115 with 1553854 attempts
  • 34.240.248.60 with 1526032 attempts
  • 50.16.69.90 with 1065868 attempts
  • 3.99.130.127 with 952639 attempts
  • 35.91.211.91 with 789722 attempts

All of these servers are registered to Amazon and located throughout the world.

 Probe Atttepts Logged - WordFence
Image – Probe Atttepts Logged – WordFence

It’s common for threat actors to use servers in any location that could be useful to them, especially if there is a location that is known for allowing (or at least turning a blind eye to) the type of activity they will be using the server for.

Common Backup Mistakes

Making a backup of the wp-config.php file by making a copy and appending a new file extension like .txt, .bak, or .html is a common method. It’s a fast way to back up the file, and it can be restored by changing the filename back to its original.

The issue is that these files are available on the web, making it relatively easy for malicious actors to locate the sensitive information.

Extended Summary

Looking at the data gathered over the last 30 days, it is obvious that searching for configuration files such as wp-config.php is common among malicious actors. The database credentials alone can be very important to anyone wishing to seize a website.

Someone looking to take over a website might find wp-config.php files even more valuable than before, as over 40% of websites currently run WordPress (Barnes, 2018). This CMS only requires knowledge of one CMS to find wp-config.php files (Barnes, 2018).

The Wordfence Scanner includes an option to “Scan for publicly accessible configuration, backup, or log files”, which will notify you if any publicly accessible configuration, backup, or log files are present in your site’s directory.

For regular scans, this option is turned on, and you may check it for custom scans as well. If you discovered that you have a sensitive file that is publicly accessible, Wordfence strongly advise removing it immediately.

By Editorial Desk
The TBN team is a well establish group of technology industry professionals with backgrounds in IT Systems, Business Communications and Journalism.
Previous Article Devo Technology Strategic Collaboration AWS Devo Technology Announce Multi Year Strategic Collaboration With Amazon Web Services (AWS)
Next Article New quantum computing feat 150 year-old experiment UNSW Sydney Research Demonstrates 20x Improvement In Resetting a Quantum Bit to Its ‘0’ State
Configuration Probing backup weakness

Tech Articles

Private Proxy List - The Pirate Bay Download Index

Private Proxy – The Pirate Bay Searchable Online Index For Free Downloads

A private proxy, or personal proxy server, is used exclusively…

September 24, 2024
Role of Medical Robots Australia

Medical Robots Revolutionising Healthcare In Australia (2024)

Australia has seen a rise in the adoption of medical…

November 19, 2024
VPN Service Providers Cyber Attacks

Should VPN Service Providers Be Held Accountable For Cyber Attacks?

Should VPN service providers be held accountable for cyber attacks…

November 3, 2024

Recent News

Cyber Sec
IT Security

CyberCX strengthens its position as a leader in cloud security in Australia and New Zealand

4 Min Read
Microsoft addresses 59 CVEs including critical zero-day flaws
IT Security

Microsoft’s Latest Patch Addresses 59 CVEs And Critical Zero-Day Flaws

3 Min Read
Samsung’s Exynos chipset “Internet-to-baseband Google
IT Security

Google’s Project Zero Calls Urgent Attention To 18 Security Vulnerabilities Found In Samsung’s Exynos Chipsets

3 Min Read
Barracuda Zero Trust
IT Security

Barracuda CloudGen Access adds web security in Zero Trust Access solution

3 Min Read
Tech News

Tech Business News

Stay up to date with the latest technology & business news trends from Australia and the around the world.

Technology News reports and whitepaper publishing services are available along with media and advertising options

Our Australian technology news includes People, Business, Science, World News, Local News, Guest publishers, IT News & Tech News Australia | Tech News was established in 2019

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

December, 10, 2024

Contact

Contact Information.
Melbourne, Australia

Werribee 3030

Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.


Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2024

Welcome Back!

Sign in to your account