Would You Be Surprised to Hear That SiteLock’s Idea of Independent Testing Doesn’t Involve Actual Independence?

Recently for several different reasons we have taken a look at claims made about quite a few web security services and products and noticed that there are often bold claims that seem highly unlikely to be true. There also is a decided lack of evidence put forward to back those claims, much less independent third-party evidence to back them. So we were surprised today to see a press release from the web security company SiteLock, Independent Testing Shows SiteLock Web-Based Malware Protection Outperforms Traditional Endpoint Solutions. Considering their track record, we wouldn’t have expected them to be the ones actually having independent testing done. After taking a quick look over the details of the testing, we found that, not surprisingly, the testing was actually the opposite of independent.

The test compared their ability to detect malicious code on websites against McAfee Complete Endpoint Protection ability to do that. It appears the testing was intended to show that products of the type that McAfee have are not well suited to doing this, but since there is not a comparison of multiple products in each category, the value that could be gleamed from the test is limited.

One finding of the test did stick out to us though:

SiteLock SMART provided 100 percent PHP and JavaScript coverage versus less than 6 percent coverage by McAfee

Considering the poor quality we have seen with SiteLock’s detection in the past, whether it be missing malicious code or falsely identifying non-malicious code as malicious, we had a hard time believing that that they would possibly detect 100 percent of the tested malicious code in a reasonable test.

A key question to determine the quality of the testing was how the malicious code being used in the test was picked. When the items tested are mentioned in the press release there source isn’t mentioned either time, here:

Testing a group of nearly 3,000 web-based malware examples to determine effectiveness

and here:

Tests showed that the SiteLock solution detected and cleaned 100 percent of the samples provided.

Looking at the complete report (PDF) by the Tolly Group, there is the answer:

The test corpus was provided by SiteLock and consisted of 2,972 samples that included PHP, JavaScript and other executables that contained a variety of attacks.

So SiteLock provided the items that would be tested against. The test clearly isn’t independent at that point and the real story would have been if SiteLock didn’t detect them all.

The complete report also makes no claim to the testing being independent.

While SiteLock knew ahead of time what would be tested, since they provided the items being tested, the company behind the other product was not allowed to see them:

In accordance with Tolly’s Fair Testing Charter, Tolly personnel invited representatives from McAfee/Intel to participate in the testing. Because of internal guidelines, McAfee/Intel was unable to review the test corpus in detail and had no further comment.

Based on that you wonder what else might be in their internal guidelines that could skew the test results.

Press Release Journalism Unsurprisingly Leads To Bad Security Journalism

When it comes to the poor of state of cyber security, we think one of the important elements that has gotten us to the current situation is the poor state of security journalism. Instead of shining a light on the many bad practices of the security industry, journalist are too often repeat the claims of security companies without doing any due diligence as to their accuracy. From what we have seen with web security companies that is a bad idea, since you not only have companies that will blatantly lie to the public, but you also have a lot of companies who don’t seem to understand the basics of security.

One company that doesn’t seem to understand the basics of security is Wordfence, which a couple weeks ago we found doesn’t understand what a zero-day vulnerability is, leading them to be claiming to have exclusive knowledge of ones, when the vulnerability they were aware of are not in fact zero-day vulnerabilities at all.

Based on how often we see security products and services promoted as protecting against zero-day vulnerabilites or attacks, at least the marketing departments of security companies think that their customers are fairly interested in protection against them.

A zero-day vulnerability refers to a vulnerability that is being exploited before the developer has become aware of the vulnerability. To be able to protect against those when they start getting exploited requires you to be able to protect against any kind of vulnerability, since any type of vulnerability could be a zero-day vulnerability. That would be difficult to pull off, to put it mildly.

As we have found detecting those vulnerabilites in WordPress plugins for our Plugin Vulnerabilities service, quickly detecting them once they are being exploited isn’t necessarily difficult, but it hasn’t been something other companies dealing with WordPress security have not been doing (as can be seen in the fact we have found numerous of those that look to have been in the wild for some time with out other security companies doing anything about them).

What is far easier then actually protecting against or quickly detecting zero-day vulnerabilites is to simply label any vulnerability you have found as a zero-day vulnerability. That is what Wordfence has done, in their cases it doesn’t seem intentional, just their lack of security knowledge once again at work.

The distinction between an actual zero-day vulnerability and any vulnerability that a security company happens to discover is quite important. First, many (maybe most) vulnerabilities are unlikely to be exploited, whereas by definition, a zero-day vulnerability is one that hackers are likely to be exploited, considering they already have been exploiting it. Protecting against a vulnerability that isn’t likely to be exploited is of a lot less value than one that is likely to be exploited. Second, if the security company doesn’t disclose the vulnerability as soon as they discover it and notifies the software’s developer, then they have a chance to fix it before it would be exploited, but again by definition, a zero-day vulnerability is being exploited before they have had a chance to do that. If a fix has been released before the security company discloses it, then those keeping the software up to date will protected if there are an exploit attempts after it is disclosed, while that won’t be the case when a zero-day vulnerability at least when it is first being exploited.

That all brings us to today, where there was an example of bad journalism leading to unfounded claims of zero-day vulnerabilities. Over at Ars Technia an article titled “Security company finds five “zero-day” flaws in EMC management console” was put out. If you read the article there isn’t anything that backs up that these are zero-day vulnerabilites, just that vulnerabilites that were discovered. In looking at the post on the discoverer’s website that is cited in the article, there is no mention of zero-days at all, instead what they state is this:

The Digital Defense, Inc. Vulnerability Research Team (VRT) has identified six previously undisclosed security vulnerabilities found in the Dell EMC VMAX Management Product family.

Ars Technica was not the only news outlet claiming they were zero-day vulnerabilites, ZDNet has an article titled “Multiple zero-day flaws found in EMC storage systems“, which again doesn’t include anything that backs up that these are zero-day vulnerabilites.

So where did the idea that these were zero-day vulnerabilites come from?

The answer seems to be the press release the discoverer put out, entitled “Digital Defense, Inc. Discovers Multiple Zero-Day Vulnerabilities within EMC Unisphere for VMAX“. While zero-day vulnerabilites are mentioned in that, there isn’t any indication in that the vulnerabilites are being exploited or were being exploited before the developer knew of them, which would be required to make them zero-day vulnerabilites and not just vulnerabilites that this security company had discovered.

It really should go without saying that doing journalism based on a company’s press release, which makes a claim that isn’t included in their related post about the issue, isn’t a great idea if you care about getting things right.

So SiteLock Is Now Apparently Blaming Their Web Hosting Partners For Their Bad Practices

One of things that we had wondered for some time about SiteLock, the web security company that seems like is scamming their customers, was what explained their partnerships with so many web hosts. Before we found about the more scam level stuff going on with them, what we had see was they seemed to be quite bad at hack cleanups and the basics of website security. So we figured that the partnerships were not based on the web host believing that SiteLock was the best choice to help their customers, but about money. When we found about how SiteLock was taking advantage of people on large scale we started to wonder how much money must the web hosts being getting to continue those partnerships, considering that their partnerships with SiteLock couldn’t be good for their reputation. To a lesser degree we sometimes have had wondered why SiteLock was partnering with some web hosting companies that had some bad security practices or were making it harder to properly clean up hacked websites. We figured that they would at least be pushing these companies to improve those situations, but we saw no evidence of that occurring.

Several weeks back we ran across a couple of things that went a long way to answering those questions.

First, it turns out the majority owners of SiteLock are also the CEO and board member of a major web hosting company Endurance International Group, which does business under the brand names A Small Orange, Bluehost, FatCow, HostGator, HostMonster, iPage, IPOWER, and many more. That would seem to make it easier to get them to partner with SiteLock. From this we also know that at least at those web hosts, the web hosts are not in the dark about what SiteLock is actually doing and if they had a problem with it they could make a change directly at SiteLock. It also goes a long way to explaining why SiteLock wasn’t insisting on better security practices at web hosts, since their owners are also running a web hosting company that doesn’t have the best handle on security.

It important to note that neither SiteLock or the Endurance International Group is upfront about this connection between the two. The only place you will find out about the connection is in Endurance International Group financial reports, where they are legally required to disclose it. Even in those it hidden away, as SiteLock is not mentioned in them, instead they are referred to by the entity that owns them, Innovative Business Services. At the point where you legal are required to disclose something, it seems to us that would be a good indication that you should be upfront with your customers about what is going on, but clearly they don’t fell the same way.

Second, it turns out that web hosting partners are getting a lot of money, if the deal that SiteLock has with Endurance International Group is any indication. As of fiscal year 2014 the Endurance got 55% of the revenue coming from sales through the partnership with SiteLock. We wonder how people that have been strongly pushed to SiteLock by their web hosts would feel when they found how much money the web host is getting by doing that, especially in situation where they are dealing with a hacked websites. It also appears to create an incentive for them to not make sure their clients are secure, since they can make a lot of money off of those websites being hacked.

That brings up to the latest piece of information we ran across about their partnerships, which is that SiteLock is apparently blaming their web hosting partners for how the services are sold. Here is a tweet from one of the writers at WP Tavern:

Assuming that is true and we don’t have a reason to believe that it isn’t (the same person did a podcast interview with a SiteLock representative in June, in which their response to a question of SiteLock’s unsavory practices was that you should trust that person that it isn’t happening (despite it actually happening)), it is a rather outlandish claim. Even if you didn’t know what we just discussed, what kind of partnership would it be where one party has no control of how their services are being sold.

In reality from everything we have read and heard, SiteLock employees are the ones doing much of what is being complained about. Even if they were not, considering how much the web host is getting paid, it doesn’t seem believable that Sitelock wouldn’t have the leverage to stop bad practices.

More importantly in the case of Bluehost, that was mentioned in the previous tweet there, seeing as SiteLock’s owner also control Bluehost, they wouldn’t’ have a problem controlling how the web host sells SiteLock’s services.

We get the feeling that the idea here is that SiteLock and the web hosts each point the figure at the other and hope that more people don’t become aware that they are dealing with two parties so closely connected.

Sucuri Doesn’t Have A Clue What Brute Forcing Actually Refers To

One of the problems we see when it comes to people making better choices on web security is that it easy for security companies that don’t have a clue what they are talking about to present themselves as having expertise they don’t have. For example, they can throw around technical terms that they clearly don’t understand, but that the public understandably doesn’t understand either, and it makes them sound like they actually know about security, when they don’t.

One example we keep seeing involves the term brute force attack, which refers to trying all possible password combination in attempt to login in to an account. It isn’t some obscure or exotic term, it has a Wikipedia page, but that doesn’t stop people from using it when actually referring to other types of password attacks.

Often times dictionary attacks, which involve trying to log in with a set of common passwords (things like “password”), are incorrectly identified as having been brute force attacks. The distinction isn’t just semantics, how you protect against those types of attacks is very different, so anybody dealing with web security that involves either of those, absolutely should know the difference. And again the term has a Wikipedia page, so it wouldn’t be hard to know what it is.

That brings us to the security company, Sucuri, which we have seen being quite a bad security company in many ways over the years. That clearly hasn’t changed. In a recent post describe how they did an experiment that was supposed to test how long it would take for successful brute force attacks of SSH logins:

A few weeks ago we ran an experiment to see how long it would take for some IPv4-only and IPv6-only servers to be compromised via SSH brute force attacks.

As they explain in the second paragraph of the post, their experiment involved them setting the password to “password”:

We configured five cloud servers on Linode and Digital Ocean with the root password set to “password.”  The idea was to see how long it would take before the servers were hacked.

To anyone who actually know what brute force attacks and dictionary attacks are, its obvious that they don’t actually know what they are talking about since that would be a password to test for dictionary attacks, not brute force attacks, but the public is unlikely to, especially as security companies keep referring to dictionary attacks as having been brute force attacks.

If you are interested in actual security, Sucuri’s lack of basic security knowledge, would be a good reason to look elsewhere.

Where Are The Vulnerabilities That SiteLock’s Vulnerability Scanning Should Have Found?

In looking over things for a possible future post about the web security company SiteLock we have noticed that one of the features prominently promoted by its hosting “partners” when selling SiteLock’s services is vulnerability scanning. For example, at HostGator, one of their hosting “partners” that is also run by the owners of SiteLock, vulnerabilities scans of varying frequency are included in each package:

hostgator-sitelock-packages

It also promoted on their page for the services as helping to prevent hacks:

Make WordPress More Secure Great news for WordPress users! SiteLock's firewall and vulnerability scans help prevent hacks and automated attacks on this ever-more popular publishing platform.

What is missing on the “partners'” websites or SiteLock’s as far as we can tell is any evidence on the claimed effectiveness of their vulnerability scanning. Vulnerability scanning of the type that it appears SiteLock does, doesn’t have a reputation for being of much value. In a study (PDF) from 2014 that looked at vulnerability scanners tied to security seals (SiteLock has one of those and its accuracy has been poor from what we have seen), it was found that two of the 8 vulnerability scanners tested detected none of the vulnerabilities that existed on a website set up with a number of vulnerabilities, which was due to those scanners using third party software that “are not meant to discover vulnerabilities in web applications”. Five of the six remaining scanners only discovered a third or less of the vulnerabilities that existed.

If their vulnerability scanner was in fact detecting vulnerabilities we would expect to have seen evidence of it elsewhere. SiteLock claims that as of 2015 they were “serving over 1 million WordPress customers”. If there vulnerability scanning was actual effective we would expect that would have found quite a few vulnerabilities in plugins based on the number of vulnerabilities we see being discovered in WordPress plugins while collecting data for our Plugin Vulnerabilities service. But we are only aware of two vulnerabilities that they have discovered in recent times and both of those don’t appear to have been discovered during the running of their vulnerabilities scanner. By comparison over at the blog for our Plugin Vulnerabilities service we have over 90 posts for vulnerabilities we have discovered this year (some of the post include multiple vulnerabilities, so the total number of vulnerabilities is even higher). If their vulnerabilities scanner was discovering other vulnerabilities in plugins on website, even if SiteLock were not aware of it, we would expect to see some mentions of that in changelogs of the impacted plugins or discussions of the vulnerabilities and yet what we haven’t seen any reference to their scanning having identified any vulnerabilities and the vast majority of vulnerability disclosures and fixes we have reviewed can be traced back to a source that wasn’t their scanner.

Whether you are looking at SiteLock or another provider of security services and products you should look for evidence from the provider that products can perform as claimed, as we often see claims made that seem rather unbelievable and from some of the claims we have taken a look into they often turn out to be at least widely inaccurate.

SiteLock Promoted Services To WordPress.com Users That Are Not Relevant to Them

In a recent post about how WordPress is giving the web security SiteLock unwarranted legitimacy by allowing them to be involved in WordCamps, conferences dedicated to WordPress, we mentioned that one of the reasons it didn’t seem great to have them was that they are falsely labeling WordPress website as having vulnerabilities due to their lack of understanding of how WordPress handles security updates. It turns out their lack of knowledge of WordPress extends further, leading to trying to sell people services that are not relevant to them, as we found while looking for information for another post.

In a March post entitled This Week in Exploits: Increased WordPress.com Security on SiteLock’s WordPress focused The District blog, SiteLock mentioned that WordPress.com had enabled HTTPS for those using custom domain names. For those not familiar, WordPress.com is a blog hosting service powered by the WordPress software. It has some rather notable differences with self hosted WordPress installations, some of which we will note in a bit. It seems that SiteLock is not familiar with the differences the WordPress.com service and the WordPress software, but that didn’t get in the way of them trying to use the blog post to sell people on unneeded services.

After a paragraph mentioning the HTTPS change, they pivot to selling their service:

If you’re a WordPress.com user, one way to take advantage of WordPress.com’s exemplary efforts is to go further and enhance the security of your WP.com site with protection services.

First they promote a web application firewall:

The first and probably most fundamental upgrade to your site’s security is to implement a web application firewall, or WAF. With a simple DNS change and SSL cert approval, SiteLock TrueShield WAF protects sites, WordPress.com or otherwise, from malicious traffic, suspicious bots, scrapers and spam comments. The PCI-compliant TrueShield WAF supports SSL and Extended Validation SSL. Service packages depend upon protection capabilities desired.

Considering how the WordPress.com service works it isn’t clear what value that would provide. Much of that would likely already be being done WordPress.com and if there was some vulnerability discovered it should impact the whole service, so you would expect that it would be quickly fixed across the service. The marketing materials for that also don’t present any evidence as to the efficacy of its protection provided by that in general, much less when used with WordPress.com.

Next SiteLock is promoting malware scanning:

The next upgrade to WordPress.com security is a malware scan. The SiteLock Malware Scan crawls websites looking for malicious code and links and immediately alerts the site owner if any are found. The Malware Scan runs daily to find malware early and keeps sites off of blacklists, and results can be viewed in the SiteLock Dashboard or downloaded as CSV for analysis and remediation.

This doesn’t seem to be to useful for the WordPress.com service since you can not use JavaScript code on it:

Users are not allowed to post JavaScript on WordPress.com blogs. JavaScript can be used for malicious purposes. As an example, JavaScript has taken sites such as MySpace.com and LiveJournal offline in the past. The security of all WordPress.com blogs is a top priority for us, and until we can guarantee scripting languages will not be harmful, they will not be permitted.

JavaScript from trusted partners, such as YouTube and Google Video, is converted into a WordPress shortcode when a post is saved.

Since malware on a website is usually JavaScript based (or in some other format not permitted by WordPress.com) there couldn’t be malware on WordPress.com blog and you also couldn’t have your website flagged for malware since, again, there couldn’t malware on these websites in the normal course of things.

Next up they try create a connection between spam and the “dreaded ‘reported attack site’ screen”:

Speaking of blacklists, the final security upgrade is a spam scan. The SiteLock Spam Scan monitors all industry-leading search engine and spam blacklists for the customer’s domain and, again, immediately alerts the customer to any adverse reports. This allows the quickest way to remediation if the worst happens, reducing, if not eliminating, customer interaction with the dreaded ‘reported attack site’ screen.

The Reported Attack Site screen refers to something that has been shown on the Firefox web browser when Google has detected malware on a website, not spam, which is something SiteLock should know. From this description isn’t clear what spam they are scanning for, since it could refer to spam emails or spam content on a website. In looking around for more information on what the Spam Scan actually does, it looks like it actually checks lists of email address claimed to be sending spam, so it isn’t clear what the search engine reference in this refers to. Unless you use your own domain with WordPress.com and send email through it (which wouldn’t be through WordPress.com) this wouldn’t be relevant.

Finally SiteLock brings up their plugin for WordPress:

Security is vital. Easy security management is a must. SiteLock Security Plugin for WordPressprovides complete website security management and allows users to access their SiteLock Dashboard from within WordPress. Highlights include real-time updates ensuring minimal latency between identifying and correcting issues, identifying specific vulnerabilities in order to remediate them as quickly as possible and managing SiteLock Trust Seal settings.

That will not work on WordPress.com blogs, since you can’t install plugins on them.

SiteLock Filed a DMCA Takedown Notice Against Our Website For A Screenshot of Their Homepage

We have seen a lot of ridiculous stuff from SiteLock recently, but this has to take the cake. They have now filed a DMCA takedown notice against our website for including a screenshot of their homepage on in one our posts.

In a post discussing how SiteLock was labeling a website as being “secure” while that contained malicious code that compromised credit card credentials we had included a screenshot of their homepage backing our mention of them claiming to be the “The Global Leader in Website Security”.

You can see how that portion of the page looked before the takedown:

sitelock-dmca-1

Beyond the fact that it is fairly clearly fair use, what is the purpose of hiding people from seeing that on our website?

They also filed a notice against another image. This time it is even more clear to be fair use since in a post discussing how SiteLock is falsely claiming that WordPress installations have vulnerabilities, we included the screenshot from their post to discuss the fact they were showing vulnerabilities existing in a version of WordPress they didn’t exist in that version.

You can see how that portion of the looked before the takedown:

sitelock-dmca-2

Worth noting is that the textual content in SiteLock’s screenshot is actually not generated by them, instead copied from other sources.

What makes this even more ridiculous is they clearly now know that their post is showing that they lack a basic understanding of WordPress security, but instead of fixing their post, they are trying to hide you from seeing an image on our website.

The only reasonable explanation we can think of for them doing this is that they thought they could get the pages those images were on removed by filing this, because removing the images alone doesn’t do anything to cover up what they are up to.

Full DMCA Takedown Notice

Abuse Department,

My name is Logan Kipp, I am contacting you on behalf of my company
SiteLock, LLC. A website that your company hosts at IP *66.39.94.41* (
WHITEFIRDESIGN.COM) is infringing on at least one copyright owned by
SiteLock, LLC.

Content has been taken from our official websites, SiteLock.com and
wpdistrict.sitelock.com, and used without the authorization of
SiteLock, LLC on the website WHITEFIRDESIGN.COM.

Infringement Instance #1:

ORIGINAL image URL: https://wpdistrict.sitelock.com/wp-
content/uploads/2016/
08/list-900×237.png

INFRINGING image used in page:
http://www.whitefirdesign.com/blog/2016/
09/06/sitelock-spreading-false-information-about-
wordpress-security-to-their-customers-through-their-
platform-scan-for-wordpress/

INFRINGING image URL: http://www.whitefirdesign.com/blog/wp- content/uploads/2016/09/sitelock-false-wordpress-
vulnerabilities.png

Infringement Instance #2:

ORIGINAL content URL: https://www.sitelock.com

INFRINGING content used in page:
http://www.whitefirdesign.com/blog/2016/
02/26/sitelock-labels-website-as-secure-despite-being-very- dangerous-for-
visitors/

INFRINGING image URL: http://www.whitefirdesign.com/blog/wp- content/uploads/2016/02/sitelock-global-
leader.png

This letter is official notification under United States Code Title 17
Section 512(c), the Digital Millennium Copyright Act (DMCA), and
I seek the removal of the aforementioned infringing material from your
servers. I request that you immediately notify the infringer of this
notice and inform them of their duty to remove the infringing material
immediately, and notify them to cease any further posting of
infringing material to your server in the future.

*Please also be advised that United States Code Title 17 512
requires you, as a service provider, to remove or disable access to
the infringing materials upon receiving this notice.* Under US law a
service provider, such as yourself, enjoys immunity from a copyright
lawsuit, provided that you act with deliberate speed to investigate
and rectify ongoing copyright infringement. If service providers do
not investigate and remove or disable the infringing material this
immunity is lost. Therefore, in order for you to remain immune from a
copyright infringement action you will need to investigate and
ultimately remove or otherwise disable the infringing material from
your servers with all due speed should the direct infringer, your
client, not comply immediately.

I am providing this notice in good faith and with the reasonable
belief that rights that SiteLock, LLC owns are being infringed. Under
penalty of perjury I certify that the information contained in the
notification is both true and accurate, and I have the authority to
act on behalf of the owner of the copyright(s) involved.

Should you wish to discuss this with me please contact me directly.

Logan Kipp
SiteLock, LLC
8701 E. Hartford Dr.
Scottsdale, AZ 85255

Phone: 1-877-257-9263 x 9012

*Logan Kipp* Product Evangelist *Mobile: *480-232-4171 *Desk Phone:*
877.257.9263 ext 9012 *International: *1.415.390.2500 ext 9012 *Email:
*Logan@SiteLock.com <logan@sitelock.com>

<http://www.facebook.com/SiteLock>   <http://twitter.com/sitelocksecure>
www.sitelock.com

CONFIDENTIALITY NOTICE: The information contained in this email,
including any attachment(s), is confidential information that may be
privileged and exempt from disclosure under applicable law, and is
intended only for the exclusive use by the person(s) mentioned above
as recipient(s). If you are not the intended recipient, you are hereby
notified that any disclosure, copying, distribution, or use of the
information contained herein is strictly prohibited and may be
unlawful. If you received this transmission in error, please
immediately contact the sender and destroy the material in its
entirety, whether in electronic or hard copy format.

Joomla Hack Cleanup Provider Still Using Joomla Version EOL’d Over Four and Half Years Ago

We often say that most security companies don’t know and or care much about security, as quick example let’s take a look at a company named CMSHelplive.com that advertises to clean up hacked Joomla website on Google. Considering that keeping the software up to date is a basic element of security and when doing a proper hack cleanup you should make sure the website is secure as possible (so the software on the website should be brought up to date) you would expect that their website is running an update to version of their CMS. But it isn’t:

cmshelplive-outdated-joomla-version

Joomla 1.7 reached it end of life back in February of 2012. So this company has not updated their software in over four and half years and have missed over 30 subsequent updates that included security fixes. When they are not even keeping their website secure, what are the chances that they are going make sure the website they cleaned up are actually secured after their work?

And of course they are also peddling the falsehood that brute force attacks against WordPress admin passwords are happening:

cmshelplive-brute-force-attacks

WordPress Giving Legitimacy to SiteLock By Allowing Them to Sponsor and Attend WordCamps

As we have continued to hear more troubling stories from the public about the web security SiteLock’s business practices and seen the damage they can cause, we have been very troubled that other organizations would provide them with legitimacy by getting involved with them.

One set of organizations is the various web hosts that had partnered with them. We recently found that the CEO of the parent company of many of those web hosting partners is also the owner of SiteLock, so it isn’t surprising that those web hosts wouldn’t have a problem with what is going on since their CEO is in on it. It would seem the others are getting paid handsomely to help them out.

Due to SiteLock discovering a couple of vulnerabilities in WordPress plugins some time ago, we had started following their blog for Plugin Vulnerabilities service. While no more vulnerabilities were disclosed on the blog, we did start noticing that they were sponsoring and attending quite a few of the official conferences for WordPress, WordCamps (and oddly giving presentations unrelated to security, including Creating a Digital Download Business – What to Sell, How to Sell It and Shortcuts to Success. and Contact Forms are Boring – 5 Creative Ways to Use Forms in WordPress.). That seems like a really bad idea, considering that imprimatur of WordPress is then connected with this company, provided them legitimacy they shouldn’t have.

There is also the issue that money that SiteLock makes taking advantage of people funding these WordCamps, which seems to be reasonable to consider as a moral and ethical issue.

It also doesn’t seem to be great idea to have a company that has shown that they lack a basic understanding of how WordPress responds to security isues, leading them falsely claim that WordPress website contain critical vulnerabilities, involved with WordPress events.

Just in the next couples of weeks SiteLock is sponsoring WordCamps in Pittsburgh, Raleigh (with a presentation also not security related, Using Curated Content in WordPress—Why and How), and Dallas. They are also a sponsor of the WordCamp for the whole US in December.

We would like be able to give you WordPress and WordCamp’s side of the story as to why they have are involved with SiteLock, but it has been a week since we contacted them with the following email asking for comment and we haven’t received any response:

We are writing a post about the fact that the security company SiteLock is being allowed to sponsor and attend numerous WordCamps despite be well known for taking advantage of its customers.

We first became aware of their practices after we had written a number of posts about other issues we had noticed involving them and then we started getting contacted by people who had been take advantage of by them, http://www.whitefirdesign.com/blog/2016/05/03/it-looks-like-sitelock-is-scamming-people/. There are a litany of complaints that can be see if you do a search on Google for something like “SiteLock scam”, including this page with numerous complaints https://sitelock.pissedconsumer.com/. While some of the complaints seem to be unfair to them, there is a pretty clear pattern of actions that seem quite problematic, to say the least.

We would like to include in our post any comment you might have as to why they are allowed to sponsor and attend WordCamps in light of that, so that the public has a better understanding of why WordCamps would get involved with such a company and take money that has been made by taking advantage of people. We would also like to include in our post any comment you might have as to any restrictions you place on what kinds of companies can sponsor and attend WordCamps.

If they were not aware of SiteLock’s reputation before, it seems that could have at least indicated that and that they reviewing things, but the lack of response points to them being aware of what SiteLock does and being okay with being involved with them.

If would like to let them know how you feel about that you can contact the central organization for WordCamp’s here. You also might want to contact ones happening locally that SiteLock is involved in, to see if they are aware of what one their sponsors is up to.

Hosting Recommendation Too

This isn’t the only Sitelock connection with WordPress. As we discussed in a recent post, one of the owners of Sitelock is also the CEO of a major web hosting provide, Endurance International Group. Endurance has many brand names they provide web hosting under, one of those being Bluehost. Bluehost has come up repeatedly in complaints about Sitelock. Bluehost is also one of the web hosts listed on the Hosting page on wordpress.org:

wordpress-bluehost-hosting-recommendation

That page has a top level menu link of the website, so we would assume that brings in a lot of business to them.

GoDaddy and SiteLock Make a Mess of a Hack Cleanup (And Drop The Ball on Security As Well)

In the complaints about the web security company SiteLock we have seen, one of the things that comes up frequently is the widely variable and often times excessive prices for their services. In some cases the pricing would be within reason if you were getting a high quality service, but as we found while helping to fix a website after SiteLock did a malware removal on it few days ago, you get the opposite of that from them.

This incident involved one of SiteLock’s partner web host, though not one the ones run by the owners of SiteLock. Instead it is GoDaddy, for which we found a couple of security issues on their end while looking into this as well.

What happened in this cases is that SiteLock through GoDaddy was hired to clean up malware on the website. Afterwards though the website was screwed up, with the styling gone and shortcodes showing up on the pages (instead of being processed). GoDaddy told the website’s owner that they would need to have someone update WordPress and re-install the theme they used.

None of this made a whole lot of sense. After removing malware or doing some other cleanup the website should appear as it did before. The theme shouldn’t be missing, unless it had been completely replaced with malicious code (which we have never seen happen). Also a part of a proper cleanup is making the website secure as possible, which would, in part ,involve updating the software on the website.

When we got in to the WordPress admin area to look over things we found that theme actually was still there, but wasn’t activated. The only reason we could think for changing to another theme would be to check if the theme being used was causing the malware to be served up, but after that checking was finished it should be reactivated.

We also found that all of the plugins were deactivated, the same explanation as the theme might explain them being deactivated. But again they should have been reactivated if that was the case. This was more problematic to deal with since we didn’t know which, if any, of the plugins were not active before the cleanup and did not need to be re-activated.

Not only did WordPress still need to be updated, but so did the plugins and themes.

Once we got a handle of those things we were able to bring the website back to working order, but further looking showed that items added by the hacker still existed (and would have allowed them continued wide access to the website) and the vulnerability that could have allowed the hacker access to begin with still existed on the website, so the hacker could have easily gotten back in.

Malicious Administrators and a Vulnerable Plugin

When cleaning up a hacked WordPress website one of thing you want to check for is the existence of users that should not exists, with an emphasis on users with Administrator role, since they have wide ranging access. Sometimes those added accounts are rather obvious, in the case of this website a couple had the email adress “backup@wordpress.org”. While seemly intended to look innocuous, there shouldn’t be any account with email addresses from wordpress.org on a website. Either SiteLock did not spot those or didn’t even do any check for that.

Looking at the details of the users in the database would tell you something more about this. In the following screenshot you can see that for the two account with the “backup@wordpress.org” and one other have the user_registered field not filled in (the others listed there have dates from before the website existed and before the original account on the website was created):

malicious-wordpress-administrators-in-database

 

That indicates that the accounts were not created through the normal process in WordPress. One other way to do that is with direct access to the database.

That brings us to another thing that SiteLock missed, one the installed plugins, Revolution Slider, had an arbitrary file viewing vulnerability in the version of the plugin installed (you can check if a website is using a vulnerable version of that and if other plugins have vulnerabilities hackers are targeting using our Plugin Vulnerabilities plugin). Hackers frequently target that type of vulnerability to try to view the contents of WordPress configuration file, wp-config.php. That file contains database credentials for the website, so accessing that could allow a hacker access to the database, which they could then use to add new users.

GoDaddy’s Security Failings

We then went to check to see if the vulnerability was in fact exploitable on the website and we found that connection was dropping when we made the request to exploit it, which looked to be GoDaddy blocking the request. Unfortunately their protection is incredibly easy to evade.

The original request we made was the following, which was stopped:

/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php

This request was not stopped:

/wp-admin/admin-ajax.php?action=revslider_show_image&img=..%2Fwp-config.php

The only change was that the “/” right before “wp-config.php” has been encoded, changing it to “%2”.

The fragility of such protection seems to pretty common, as earlier this week we found that two WordPress security plugins protection against another vulnerability could bypassed by simply adding and “\” in the right location (the 9 other WordPress security plugins we tested provided no protection).

Remote Database Access

Even if a hacker gets the database credentials by exploiting an arbitrary file viewing vulnerability they still need some method to access the database. In the case of the database for the website remote access is permitted, which allows someone to connect to the database from outside of GoDaddy’s systems. That type of access makes it really easy for a hacker, so it should be disabled by default.

In looking how we could disable remote access to the database, we found that based on their documentation it shouldn’t have even been enabled. The documentation says that you need to enable direct access when creating a database for to connect remotely:

Connecting remotely to a database lets you manage it using tools like MySQL Query Browser,MySQL Workbench, or Microsoft SQL Server Management Studio Express.

If you want to connect remotely to a database, you must enable Direct Database Access when setting it up1 — you cannot enable it later.

But the database in question is listed as not allowing direct access:

godaddy-database-details

So something isn’t right.

If we didn’t know what SiteLock was up to at this point we would be asking why they had not noticed those problems with the partner GoDaddy’s security and gotten them to fix them, but knowing what they are doing it isn’t surprising they wouldn’t have done that. If anything getting their partners to improve their security would mean less money for them and less money for the partners as well.

If you want a hacked WordPress website cleaned up properly, we are always available to help.