Podcast
Root Causes 223: CT Log-Enabled Attacks on WordPress Sites


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
May 13, 2022
Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place. This attack is novel in how it exploits Certificate Transparency information to identify likely targets. In this episode we explain what is happening and why it's noteworthy.
Podcast Transcript
Lightly edited for flow and brevity.
So, let’s think about that for a moment. The bad guys have this – are taking advantage of this unintended consequence of CT logs which is basically, they’re getting information publicly, just like everybody else does, about brand new certificates. It may not absolutely mean that it’s a brand new site. It may not mean but they’re taking the 80/20 Rule, probably saying it probably is. I would say here the fact that WordPress comes up so much in this topic is probably because there might be a bad practice people are doing, and this was mentioned in an article that we were looking at, and it makes a lot of sense. The fact that you really don’t want to be exposing a WordPress site that’s been just set up and not locked down and secured and then expose that to the public internet. So in other words for those of you who know how to build a simple website, the analogy here is think of the equivalent of your index.html file, which directs you to – here is the website I want you to look at whenever somebody does browse to you. You probably want to direct that somewhere else direct it to a, we’re getting ready page or something rather than the site itself because of the fact that a WordPress site in its infancy probably isn’t I guess the right way of saying it is, it is probably vulnerable until it has been made not vulnerable by some work. And so the certificate is part of that.
The other thing I find interesting about this attack, not just the unintended consequences of it, but the innovation, like, don’t think the bad guys are stupid. These are bad guys that came and came up with the unique angle for a way to use CT logs in order enable and exploit that – the industry didn’t foresee. All the smart guys at the browsers and the CAs and everybody else who has to do with CT logs, and journalists and industry watchers; that community didn’t foresee this. But, somebody who was seeking an exploit did, and that’s also part of the, that’s part of the ground conditions that we’re dealing with.

