Operating WordPress requires some knowledge of security-related issues. This section will explain some commonly used security-related terms.
1 Vulnerability
A vulnerability is a gap in a program that allows the programmer and site operator to perform an unintended action.
For example, if a plug-in has an image upload function and there is no mechanism to verify that the upload function is being executed with administrative privileges and that the image is an image, it is possible to upload an unauthorized program over the network to the server.
2 Malware
The term “malware” is an umbrella term that includes computer viruses.
It stands for “malicious software” and refers to the main body of a program (or its embedded parts) that performs malicious actions not intended by the site operator or program author.
3 Backdoor
A backdoor is a program that is installed on a server and serves as a starting point for hackers to perform the activities they want to perform on the server. The difference from a vulnerability is that it is embedded with the intention to execute a malicious program.
For example, if the following code is placed on a server, any program can be sent across the network and executed on the server.
eval($_POST['backdoor']);
The following is an example of what kind of malicious programs can be executed.
Send spam mails
Modify the site and direct the user to another site.
Create malicious pages
Hosting viruses
Hosting viruses.
Mining virtual currency
etc…
4 Comment spam, spam mail
Spam, originally a product of ground meat, has come to be used in the West as a metaphor for something that is so common on our dinner tables that we have grown tired of it and no longer need it.
In other words, it is a large amount of unwanted advertising. Since WordPress allows anyone to write comments and anyone can send inquiry e-mails, these unnecessary advertisements are sometimes mechanically sent in large quantities to the comments section or to the administrator’s e-mail.
5 Brute Force Attacks
In Japanese, this means a brute force attack. In WordPress, this attack is most often performed on the login screen.
Using a dictionary of hundreds of thousands of commonly used passwords, the hacker programmatically and mechanically performs one login operation after another, attempting to log in with WordPress administrator privileges. This is called a brute force attack and can slow down the site.
6 SQL Injection
Injection is an unauthorized embedding. In WordPress, content, administrator passwords, and site settings are recorded in a database, a piece of software that efficiently stores and retrieves data.
SQL statements are the processing code that records and modifies data in the database and can be executed from the programs included in WordPress.
Hackers take advantage of vulnerabilities in the WordPress program to attempt to rewrite this database. It is sometimes possible to take advantage of a vulnerability to execute a malicious SQL statement to, for example, rewrite the password for administrative privileges.
7 Redirect Hack, SEO Hack
A tampering (malware) that forces users who access your site to go to that site without permission in order to improve access to some site is called a redirect hack. This is a very common type of malware in WordPress.
In addition, search engines consider a site with a high number of links to be one of the indicators to bring it to the top of the search results, so they may tamper with your site and embed links to the site they want to bring to the top of the search results without your permission. This kind of tampering with a site to gain an advantage in search engine rankings is called an SEO hack.
8 Security Patches (Security Updates)
Many vulnerabilities in WordPress itself or in plugin themes are announced or disclosed as alerts or to allow the programmers to close the vulnerability.
A program or method of closing a vulnerability is called a security patch.
Updates to programs that close these vulnerabilities are called security updates.
9 DDOS Attacks
A DDOS attack is an action that causes a large number of accesses to a site, slowing down the site and making it difficult to display or stop the site.
This attack can cause a site to display extremely slowly, or it can cause the server management company to generate a 403 Forbidden error on the site, making it impossible to display the site itself.
Malware can also be embedded and the malware can act as an intermediary for DDOS attacks on other sites.
10 BOTS
Bots are programs (tools) used by hackers to efficiently perform hacking and other illegal activities, often automatically performing mechanical repetitive tasks.
The following types of bots are available
BOTs that conduct brute force attacks
DDOS attack bots
Bots that search for vulnerable sites in search engine results
BOTs that attack multiple vulnerabilities to see if they can be penetrated
BOTs that post spam comments
Bots that send out spam emails
etc…
Free WordPress:Malware Scan & Security Plugin [Malware and Virus Detection and Removal].