Hackers have targeted nearly 2,000 compromised WordPress sites, leveraging fake NFT and discount pop-ups to deceive visitors into connecting their wallets to crypto drainers. Initially, around 1,000 WordPress sites were compromised to promote these crypto drainers, employing malvertising and YouTube videos for dissemination. However, after facing setbacks in their original campaign, hackers shifted tactics, deploying new scripts to turn visitors’ browsers into tools for brute-forcing admin passwords on other sites.
These attacks involve a network of approximately 1,700 brute-forcing sites, including prominent targets like Ecuador’s Association of Private Banks website, with the ultimate goal of building a large pool of monetizable sites. Cybersecurity experts have observed the threat actors monetizing the compromised sites by displaying pop-ups promoting fake NFT offers and crypto discounts, further highlighting the evolving nature of the threat landscape.
The malicious scripts, loaded from the domain dynamic-linx[.]com, inject promotional pop-ups onto webpages, enticing victims to connect their wallets under false pretenses. Once connected, the crypto drainers exploit vulnerabilities to siphon funds and NFTs from victims’ accounts, posing a significant risk to the cryptocurrency community.
To safeguard against such threats, users are advised to exercise caution when encountering unexpected pop-ups and only connect their wallets to trusted platforms. Additionally, staying informed about emerging cybersecurity risks and maintaining vigilance in online interactions can help mitigate the risk of falling victim to crypto drainers and other malicious activities targeting digital assets.