The Wordfence Threat Intelligence team has been tracking spikes in two vulnerable plugins that have had patches available for months.
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQby3pdqSV1-WJV7CgTDbW1L6fR58_chzqVnQB0Y6l8LZSW3nysZg2JqvrvW397DFp82xdzzW98ds0x5xRNxpW24CnLc8-g1dvW5SJWZl4yPYfrW7YfsX43L0cmfW7BGbqC11FvnYW2TGl_b3RsFp-W6-xb4T3GczSMW7WTvjG5VvD4JW3k-x177YV1hwW3qggVm4cQTlRW5qplFL9j_4mDW7Hmg5b8Y4n4qW1Lpv0H7QGC4vW226DXy1cpHz6W6PYSGv8hTJfbN5dmYj-GPwCf38HM1 )
Kaswara-Adning Featured Image (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQcL3pds1V1-WJV7CgVYgW7rRg238BHR0QN1jpmXGC6pZsW1FJBkB5lkw-bW8QP-zB5pL7S2N50_nYcXrRxBW9kv65H180Jx-W80yJbM6tPtk9W7F_XX83jWcxZW1yk03V8t4bSvW8n5b6G3gRgg0W6BSLmx5rFtj4VqnrvG8JZwM6W54xVTm218hwJW963gT585v8bjW6W4LSd1lDlX-W4lfbRB3H0f5RN5-5Nf6h63LyW94M0m36SzBTJW5h_-RL3gtqTNW7w-DxH2M7h5CV1NC-F1PPNRqVBgPyz4tnHz3W43T55t18NmwXW6vH1cd1pq3hRW7vhLd18HsYzbW6kVspV7rYpB5W49D4MG1j3llMW1Fhdm24rmR9b320g1 )
The Wordfence Threat Intelligence team continually monitors trends in the attack data we collect. Occasionally an unusual trend will arise from this data, and we have spotted one such trend standing out over the Thanksgiving holiday in the U.S. and the first weekend in December. Attack attempts have spiked for vulnerabilities in two plugins.
The larger spikes have been from attempts to exploit an arbitrary file upload vulnerability in Kaswara Modern VC Addons <= version 3.0.1, for which a rule was added to the Wordfence firewall and available to Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgV0TN7BMlDCCV9tdW2Hdvjs65RPDyW8yyfDR3dmpRCN8JZpcLLHS1sW26HxD08PTx98W1yp8_N4lcHD1W5TkXsh6t-DGKW4S-LlS6pJ1pJW4Y8NDT7SYZWtW2K2-LY4qpCh_VsPfgp1KzmW3W8sqBbC7Y8pcfW6S6TNz2QK_cyW8D0GWw3QyMSzW9ch8Jy5DnBMgW59r3yc52rrbyW9hKBjZ8QVNr1W1xjR1w2XPcjyW6bHPvG46L4kXN1LGw8BwHsJHW2l3Nyq6cDc5XW6zhzMW9lGHnQW4qV3G61x6RmWW6qqBtV6jXx6w36Bg1 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgBsxW4dmWyX7ycCSxW2YZb7l1gt0K9W21pzkd6tBJJsW3kNnbB3Dqjb8W1tTklr6678szW7p6N322HFq2DW11kTrP33jrfwW732-ls2X2dMVN4L6TXXDmVbqW5SfBC71NmWstN2mZ1FDjHf7YW8LSjW577ZRN9W1Rk0fl7S8k9fMsx_dZ7PVR0W4TdBsz4pGBchW9fjzN65VkpgMW2xMnWs9hxmzmW3v5vCd6CCTTjW5q2Nvt8KVXWHW208SL16_ZwcHW8L4QLz8P9jQtN483097_WRvqW6gvWl3641J-2W660KL16YZWYJ3njb1 ) , and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgSpPW5l3dt73nHt8NW6_zpxj38jp4CW4Nxf485gskJlW4ZDdj46hMzFtW7fh2Pm4g_m7VW1NVzBl8Cr89jVxNH2w4wjB7KW49YnhX5ZWSk8W8FXGdC6l2yFTW3WHcRY1MFSqsW1zmKCm6CgLtVW5Rg9XL3V-fcfW3XkZCh6YJ1gmN6x4YngD-YMdW4HSplm7kR49-W4bgCbD5RdmPCW4-cYpn34rj6dW1SMD1t1b_4H8W8Zv5sr34htL5N5zrJKx4llvZW5JFPdF7qV_-hW5xxK_g6bM8BwW2s1KPh2T4dZ9VZJrqX9j-Tw534gx1 ) users on April 21, 2021 and released to users of Wordfence Free (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgWt_W4spwdB7N1Ty-W2wTMS54N2YXzW8YP13K6Y62PjW4zgqlk1qvjwsW85bRmR2XR5L1W7sVPv22v68gtW9cRcBH5jVvfDW1dZbBz6VxC22W4SNHmx1-gRl-W18Bwz_2D9QdpW733tKR7Jg3gFW6sHMwL1wJ9SZVq5pKz9lVQqLN37dK_0XwgtLW5G6-JW4vyV_ZW5wk09c6jWZS3N7x38xbCCFHfW1f203r4r9ZC6W4ZFwV220blvzW96681n86c5RmW1SfPXG7pbfgXW5LJ3BD3MMrQGW2glWq72pm3cmW7s3YzP84cLYd3c0X1 ) on May 21, 2021. The other vulnerability is an arbitrary file upload and arbitrary file deletion vulnerability in the Adning Advertising plugin with versions <= 1.5.5, with our firewall rule being added on June 25, 2020 and made available to free users on July 25, 2020.
This email content has also been published on our blog and you're welcome to post a comment there if you'd like to join the conversation. (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQcL3pds1V1-WJV7CgVYgW7rRg238BHR0QN1jpmXGC6pZsW1FJBkB5lkw-bW8QP-zB5pL7S2N50_nYcXrRxBW9kv65H180Jx-W80yJbM6tPtk9W7F_XX83jWcxZW1yk03V8t4bSvW8n5b6G3gRgg0W6BSLmx5rFtj4VqnrvG8JZwM6W54xVTm218hwJW963gT585v8bjW6W4LSd1lDlX-W4lfbRB3H0f5RN5-5Nf6h63LyW94M0m36SzBTJW5h_-RL3gtqTNW7w-DxH2M7h5CV1NC-F1PPNRqVBgPyz4tnHz3W43T55t18NmwXW6vH1cd1pq3hRW7vhLd18HsYzbW6kVspV7rYpB5W49D4MG1j3llMW1Fhdm24rmR9b320g1 ) Or you can read the full post in this email.
Kaswara-Adning Total Hits (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQd13pdskV1-WJV7CgDL2W6rFrMG5BxdvsW8pxVz32shCXdN2gCy2xqJH2TW2z9VQq7VLDx-W7Dppk53MG-T-W6m9YhB12J9WNW22p4j-4rZ7PCW7zqHlJ10D5VrW6WBp0p4jkLQXW53KKFZ86y7_KW1xQ-Zv2lwQm9W78f_-57sn7gNW5T9Jvc9jkXBlW9jyx8v7MvwyhW45Zpc02TDQR-W2XYt2J17cJ6fW6qxCQH1SbPbBW7k068l4xr1lVN8r9KltsQMbDW6DgkFn53dT1wW5XV0sf41kJ6VW74wFTN4Z6NqyV6rJtq5k5CrgVwVkJk22gq3tW1DFbsq8CnnjbW8l0z7n6VgjTqW6Kdvgn6p2tTqW5GPqBP6-z0CGW75LG437WJ8qJW2npCRh66wrPK3h6x1 )
One thing that makes these spikes interesting is the fact that they are occurring over holidays and weekends. The first spike began on November 24, 2022, which was the Thanksgiving holiday in the United States. This spike lasted for three days. The second spike looked a little different, starting on Saturday, December 3, 2022, dropping on Sunday, and finishing with its peak on Monday. These spikes serve as an important reminder that malicious actors are aware that website administrators are not paying as close attention to their sites on holidays and weekends. This makes holidays and weekends a desirable time for attacks to be attempted.
During these spikes, exploit attempts have been observed against the Kaswara vulnerability on 1,969,494 websites, and on 1,075,458 sites against the Adning vulnerability. In contrast, the normal volume of sites with exploit attempts being blocked is an average of 256,700 for the Kaswara vulnerability, and 374,801 for the Adning vulnerability.
Kaswara-Adning Hit Comparison (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQd13pdskV1-WJV7CgRQ3W9bckwz5ZVY_8W7vRZQJ26dbs8W8P8kG41zkn_hW7msWmq2Dsn8lW5P7r6r6p-0t1W1G7zcz1R16d-W915-XF62N8YRW3nh8Hb533DDDW6_mJ719cKd5sW5H1CGh4SGm7zW1V18xy8c39c4W8GV6Ll8BMYwhW3xckv-24V3QFW4ZmWqQ61hn62W8bQM7P8c7_f2W99Bzqq9ly0BjW62vCqS8jf8TVW3PK_zz2fLykwW2xPHcM7SRK-9W5wl5x01hcGT-W6n41k76lVTWJN24Vlz9KN7DCW2b3DCJ1Hby2sW61Gl4w7QXLXMW2RKsf690nQ6YW4FNG0y2fKLLmW4zwSTX7qT-0VW8mxXcg8ns3vdVBNQCt5_v8NDW14QFx48Tqtt336QY1 )
the spikes we have seen over the Thanksgiving holiday and the first weekend in DecemberThe Kaswara Modern VC Addons plugin had more than 10,000 installations at the time the vulnerability was disclosed on April 21, 2021, and has since been closed without a patch being released. As long as this plugin is installed, it leaves the site vulnerable to attacks that make it possible for unauthenticated attackers upload malicious files that could ultimately lead to a full site takeover due to the fact that the ability to upload PHP files to servers hosting WordPress makes remote code execution possible. Any WordPress website administrators who are still using the plugin should immediately remove the plugin and replace it with a suitable alternative if the functionality is still required for the site, even if you are protected by the Wordfence firewall, as the plugin has not been maintained and may contain other issues. We estimate that about 8,000 WordPress users are still impacted by a vulnerable version, making them an easy target.
The Adning Advertising plugin had more than 8,000 users when our Threat Intelligence team performed our initial investigation of vulnerability on June 24, 2020. After some analysis, we found two vulnerabilities in the plugin, one that would allow an unauthenticated attacker to upload arbitrary files, also leading to easy site takeover. We also found an unauthenticated arbitrary file deletion vulnerability that could just as easily be used for complete site compromise by deleting the wp-config.php file. After we notified the plugin’s author of the vulnerabilities, they quickly worked to release a patched version within 24 hours. Any users of the Adning Advertising plugin should immediately update to the latest version, currently 1.6.3, but version 1.5.6 is the minimum version that includes the patch. We estimate that about 680 WordPress users are still impacted by a vulnerable version of this plugin.
The key takeaway from these attack attempts is to make sure your website components are kept up to date with the latest security updates. When a theme or plugin, or even the WordPress core, has an update available, it should be updated as soon as safely possible for the website. Leaving unpatched vulnerabilities on the website opens a website up to possible attack.
Cyber Observables
The following are the common observables we have logged in these exploit attempts. If any of these are observed on a website or in logs, it is an indication that one of these vulnerabilities has been exploited. The IP addresses listed are specifically from the spikes we have seen over the Thanksgiving holiday and the first weekend in December.
Kaswara
Top ten IPs
- 40.87.107.73
- 65.109.128.42
- 65.21.155.174
- 65.108.251.64
- 5.75.244.31
- 65.109.137.44
- 65.21.247.31
- 49.12.184.76
- 5.75.252.228
- 5.75.252.229
Common Uploaded Filenames
There were quite a few variations of randomly named six-letter filenames, two are referenced below, but each one observed used the .zip extension.
- a57bze8931.zip
- bala.zip
- jwoqrj.zip
- kity.zip
- nkhnhf.zip
Top Ten User-Agent Strings
- Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36
- Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36 X-Middleton/1
- Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36
- Amazon CloudFront
- Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36
- Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2224.3 Safari/537.36
- Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2656.18 Safari/537.36
- Mozilla/5.0 (X11; OpenBSD i386) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36
- Mozilla/5.0 (X11; Ubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2919.83 Safari/537.36
- Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36
Adning
Top Ten IPs
- 65.109.128.42
- 65.108.251.64
- 65.21.155.174
- 5.75.244.31
- 65.109.137.44
- 65.21.247.31
- 5.75.252.229
- 65.109.138.122
- 40.87.107.73
- 49.12.184.76
Common Uploaded Filenames
Most observed exploit attempts against the Adning plugin appeared to be nothing more than probing for the vulnerability, but in one instance the following filename was observed as a payload.
- files
Top Ten User-Agent Strings
- python-requests/2.28.1
- Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36
- Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
- Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
- python-requests/2.28.1 X-Middleton/1
- python-requests/2.26.0
- python-requests/2.27.1
- Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7; _at_longcat) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
- Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36 X-Middleton/1
- ALittle Client
Conclusion
In this post we discussed two vulnerabilities that have spiked over the past two weekends. Removing or updating vulnerable plugins is always the best solution, but a Web Application Firewall like the one provided by Wordfence is important to block exploit attempts and can even protect your site from attacks targeting unknown vulnerabilities. The Wordfence firewall protects all Wordfence users, including Wordfence Free (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgWt_W4spwdB7N1Ty-W2wTMS54N2YXzW8YP13K6Y62PjW4zgqlk1qvjwsW85bRmR2XR5L1W7sVPv22v68gtW9cRcBH5jVvfDW1dZbBz6VxC22W4SNHmx1-gRl-W18Bwz_2D9QdpW733tKR7Jg3gFW6sHMwL1wJ9SZVq5pKz9lVQqLN37dK_0XwgtLW5G6-JW4vyV_ZW5wk09c6jWZS3N7x38xbCCFHfW1f203r4r9ZC6W4ZFwV220blvzW96681n86c5RmW1SfPXG7pbfgXW5LJ3BD3MMrQGW2glWq72pm3cmW7s3YzP84cLYd3c0X1 ) , Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgV0TN7BMlDCCV9tdW2Hdvjs65RPDyW8yyfDR3dmpRCN8JZpcLLHS1sW26HxD08PTx98W1yp8_N4lcHD1W5TkXsh6t-DGKW4S-LlS6pJ1pJW4Y8NDT7SYZWtW2K2-LY4qpCh_VsPfgp1KzmW3W8sqBbC7Y8pcfW6S6TNz2QK_cyW8D0GWw3QyMSzW9ch8Jy5DnBMgW59r3yc52rrbyW9hKBjZ8QVNr1W1xjR1w2XPcjyW6bHPvG46L4kXN1LGw8BwHsJHW2l3Nyq6cDc5XW6zhzMW9lGHnQW4qV3G61x6RmWW6qqBtV6jXx6w36Bg1 ) , Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgBsxW4dmWyX7ycCSxW2YZb7l1gt0K9W21pzkd6tBJJsW3kNnbB3Dqjb8W1tTklr6678szW7p6N322HFq2DW11kTrP33jrfwW732-ls2X2dMVN4L6TXXDmVbqW5SfBC71NmWstN2mZ1FDjHf7YW8LSjW577ZRN9W1Rk0fl7S8k9fMsx_dZ7PVR0W4TdBsz4pGBchW9fjzN65VkpgMW2xMnWs9hxmzmW3v5vCd6CCTTjW5q2Nvt8KVXWHW208SL16_ZwcHW8L4QLz8P9jQtN483097_WRvqW6gvWl3641J-2W660KL16YZWYJ3njb1 ) , and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgSpPW5l3dt73nHt8NW6_zpxj38jp4CW4Nxf485gskJlW4ZDdj46hMzFtW7fh2Pm4g_m7VW1NVzBl8Cr89jVxNH2w4wjB7KW49YnhX5ZWSk8W8FXGdC6l2yFTW3WHcRY1MFSqsW1zmKCm6CgLtVW5Rg9XL3V-fcfW3XkZCh6YJ1gmN6x4YngD-YMdW4HSplm7kR49-W4bgCbD5RdmPCW4-cYpn34rj6dW1SMD1t1b_4H8W8Zv5sr34htL5N5zrJKx4llvZW5JFPdF7qV_-hW5xxK_g6bM8BwW2s1KPh2T4dZ9VZJrqX9j-Tw534gx1 ) , against these vulnerabilities. Even with this protection in place, these vulnerabilities are serious as they can lead to full site takeover, and the Kaswara Modern VC Addons should be immediately removed, and the Adning Advertising plugin should immediately be updated.
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQbS3pdr7V1-WJV7CgVY6W5qB-y186rWMBW4QX7W27Bb0GQN54nqp1KfSnsW91H1sR3DltlCW7QLbtC8D10FtW7mLv-d47Wh-lN4p_jhhDwW8hW825_0986kQMGW2Z2gyL4QnyW3N5JVzVjJpSxYW69ctGw3wr8ljN5bJ0vs_f0clW4N89869k4KNtVmhr9w5Gnlp6W6CbPYT6F1CZpVH5wxL6TZKZlW4qZXRH1W5jVmW4JTGd56N3kPhW7fjj185F9cHyW5swB3-7g9J5GW1C9Cx23MvF3KW666-rP58_Z61321S1 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgVs6VrtgfJ1Mfv-KW7V59kj3Ml539W3S2jz041GwCqW6rXWm07b062fW3CB6Wf6PrxCrW6P4BnK7NwDl8VcD0hh24CLXgW1F6TFH1gSJ2yW2vfX_p8v5TjZW2VCn3h1xHj5tW3jLNCb2Hm8wXW645j0t9707_FW9bwB5v2m_-lwW2pzsRW5JhHkDW1r8j611jPdSLW3KFdcs4Xtrq1N617jDgHnFjXW22QRsz2f501kVlH7NL1sYX-YW784XN96nT2vdW1ZbmX61tCzsJW7PwsYT3S9cKnN5gM4KwTj221W5lbR703pYXCJ3k-K1 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQbS3pdr7V1-WJV7CgZ0MW5VYSR26hZL_kW1lPgy14vn3TnN1tng13hv2B-W5VwJKh3l2t3NVKsnPs2HGJRDW6JFHGk5XN3q4W6x9vWT97wKR0VS7t3X7c3kHTW8SFz4X7NCjF7W1_FMQy8-vc1VW6N4xFh6NX8CyW3SdWmk4yhmRxW1RxSl813YnwcW2x-MY22GK3qrW7r4Nmd3XyV2zW34JQbq5Mldj7W7qXySx3mfNqSW1Jmm4V470LrNN97NvT7ckK2sW1FDJHs2dVjTgW7qH2bz5HFML6W36CzGq4M8S9n3nj21 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgHrfVQ_rN61mf7stW3D_kVR7-gDSWW6RWrtd2QvYv4W218Vh01V4W5hW4JrjXr7ZFXKwW1xvp9J6k7-VPW4ZJqt31NHCs4N5GXRgHx42cKN6cCtTQp-hDDW8Dgx5z93nnWdW7ZMypl9dNTM8W7FYR_q1Bq6-WW3q6YmX8-Zd63W5Y49yx6-x5wKW8wHlck68N9gWVkbt633dk0cHW2P8Ggp3Z0vMMN4N97WF22nx7W7-SVwD31s-TgW65sbks1pjb0-W4NpQYy6smPrBW5vvFb928lS9QW2wNCF02BCk4-VVvPP58qq11C3l8g1 )
wf-stacked-intelligence (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQc73pdrrV1-WJV7CgNPxW47-nCL2N6g65W5fDXlT57SYbCW7T300Y7752yWN6NcTzTJgt_3W8K6tNX79FGFTW4_GD7H8tmtMgN7-R7xvhzSh6W7Pkzdn9b6GYvW977W5Y4rF4YDW2X5Wmk7mxRySW32kMP-1MF_JWW4zwxXB3JknbjW2KxVbH853mcRW1pfqq95t59x_W50k9WM6TYzcSW5Mg7HD2cdcH-W7VKKgJ58YljCW7gGLTL4B4S2JW7mBKCW1M84VgW5Mwnfz2_zJQ8W1YmpX41dnlcwW3TjSmH2jcjzSW14XyZm4PsXK-N6q-Bbw4gCJG3p491 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWJ_K943Zbx2W6WmmTN32mkhVW4xGMq_4TtV10N4dVQby3pdqSV1-WJV7CgNrFW3SbMZl3dSHq2W4mDWt42KQgV1W3svxnG6KkhXKW5Vxz9Q68RSC-W56HGCl64y_FkW5WsbWW2rQwX4W4SgkK08SkyrdW1nFH784Xx0y8W6whSF96p3WCCN4LhySZZJtKZW64QRzF4qtbfnW8xCSFT342wN9W3k-2fg83SwcrW7HNh5J7Tm6HVW3mQ2wb8vjkqyW5LQGFT5vTtr3V3WWbq3CBWWhN6XG8kGbpvV5W6cSk8Y6F5hwMW69vmFR89wP9L360r1 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFgjW53S0Gb6dzL3bV25wGh7GZ4jJN7yyYtcXdWZwN6YwX4TXk_7QVbvVnk20fPyBVJdCbF10jHkJw5-_s679s62&v=3&_hsenc=p2ANqtz--pRm80qxLtCI-DNO6_6JktlHcHfkFempn7ObZcRiAchvkqoK0HIx6qJo1MfknL7AV01HFDpkt7LcAx5tWcip3EcRuz3g&_hsmi=237586468 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFgjW53S0Gb6dzL3bV25wGh7GZ4jJN7yyYtcXdWZwN6YwX4TXk_7QVbvVnk20fPyBVJdCbF10jHkJw5-_s679s62&v=3&_hsenc=p2ANqtz--pRm80qxLtCI-DNO6_6JktlHcHfkFempn7ObZcRiAchvkqoK0HIx6qJo1MfknL7AV01HFDpkt7LcAx5tWcip3EcRuz3g&_hsmi=237586468 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Mon Dec 12 2022 - 20:10:16 CET