Blogvault – Does your backup plugin really secure your website?

Home Forums BulletProof Security Pro Blogvault – Does your backup plugin really secure your website?

Tagged: 

This topic contains 0 replies, has 1 voice, and was last updated by  AITpro Admin 1 year, 3 months ago.

Viewing 1 post (of 1 total)
  • Author
    Posts
  • #32559

    AITpro Admin
    Keymaster

    Blogvault backup plugin – Some people believe that relying on their web host security measures and using a backup plugin like Blogvault is all they need for their website security strategy.  Unfortunately, that is not true and I will explain why.

    A new recent BulletProof Security Pro customer decided to get the BPS Pro security plugin after years of only relying on the Blogvault backup plugin and their web host security measures for their website security strategy.  The logic of this website security strategy is that if the website gets hacked then they can just restore the website from a Blogvault plugin backup.  Here is why that logic failed and did not work.

    As soon as BPS Pro was installed on the person’s website it was obvious that this website was already hacked.  Hacker files were being detected and quarantined by BPS Pro AutoRestore|Quarantine.  This person contacted us about the quarantined files and we confirmed that the files were malicious hacker files.  When we did some historical forensic research on this customer’s website we found that this website had already previously been hacked for over 14 months.  The customer stated that they had seen something that looked suspicious a couple of times over a 12 month period and they had just restored their website from a Blogvault backup.  Unfortunately, a hacker shell script existed in all Blogvault backups that they used to restore their website from.  So the website was reinfected each time they restored their website from a Blogvault backup plugin backup.

    Summary:  if you are only relying on the website security strategy of restoring the site from backups with a backup plugin like Blogvault then you will have no idea if the backups are actually clean of hacker files and code.  High level hackers do not want you to know that your entire hosting account is under their control and will be very careful not to expose that they control your entire hosting account.  So since backup plugins like the Blogvault backup plugin are not security plugins then they do not have the capability to detect if a website is hacked or not and the backups that a person makes using a backup plugin like Blogvault will just backup malicious hacker files and code in the Blogvault backups.  So when someone believes they are restoring their website from a good clean backup then they are actually just reinfecting the site with the original hacker files and code.

    Other Related BlogVault Plugin Info:

    BlogVault Security Breach Infects Customers’ Sites With Malware:  February 6, 2017
    https://wptavern.com/blogvault-security-breach-infects-customers-sites-with-malware

    BlogVault, a real-time backup and migration service with a WordPress plugin that’s active on more than 20K sites, announced over the weekend that it suffered a security breach that exposed data. Akshat Choudhary, founder of BlogVault, explains that some customer sites were accessed without authorization and were infected with malware.

    Forum Topic regarding BlogVault’s ridiculous claims that WordPress Security Plugin’s do not really secure websites: 
    https://forum.ait-pro.com/forums/topic/blogvault-does-your-wordpress-security-plugin-really-secure-your-site/

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.