Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Over 5000 WordPress Sites Hit by Malware

January 15, 2025
Reading Time: 2 mins read
in Alerts
SimpleHelp Vulnerabilities Expose Risks

A new malware campaign has compromised more than 5,000 WordPress websites by creating unauthorized admin accounts and installing a malicious plugin. The attack, first discovered by the web security company c/side during an incident response engagement, involves the use of a malicious script that loads from the wp3[.]xyz domain. This script creates a rogue admin account, “wpx_admin,” and installs a malicious plugin known as plugin.php, which is downloaded from the same domain. The plugin’s purpose is to collect sensitive data, such as administrator credentials and logs, and send it to the attacker’s server.

Once the rogue admin account is created, the script verifies the operation and installs the plugin on the compromised site. The malicious plugin operates by exfiltrating data in an obfuscated manner, making the stolen information appear as an image request. While the exact infection vector is still unknown, the malicious script takes over the website and gives attackers control over critical administrative features. Researchers believe the attacker is using this method to gather sensitive information that could further compromise the security of the site and its users.

To mitigate the risks associated with this attack, c/side recommends that website owners take immediate action

To mitigate the risks associated with this attack, c/side recommends that website owners take immediate action by blocking the wp3[.]xyz domain using firewalls and security tools. Admins are also urged to review privileged accounts on their websites to check for unauthorized activity, particularly by identifying and removing any rogue plugins. These precautions are vital to ensure that attackers are unable to maintain long-term access to compromised sites and prevent further data exfiltration.

Additionally, the report emphasizes the importance of strengthening CSRF protections and implementing multi-factor authentication to enhance the security of WordPress sites. To improve CSRF defenses, c/side recommends using unique token generation, server-side validation, and short expiration times for tokens. Multi-factor authentication should also be set up to protect accounts, especially those whose credentials have already been compromised. These measures are essential to protect WordPress websites from similar attacks in the future and to secure any previously compromised accounts.

Reference:
  • Malicious Plugin Targeting 5000 WordPress Sites Exfiltrates Sensitive Data
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJanuary 2025
ADVERTISEMENT

Related Posts

DevOps Servers Hit By JINX0132 Crypto Mine

Fake FB Ban Fix Extension Steals Accounts

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Actively Exploited Chrome V8 Flaw Patched

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

DevOps Servers Hit By JINX0132 Crypto Mine

June 3, 2025
Linux Core Dump Flaws Risk Password Leaks

Linux Core Dump Flaws Risk Password Leaks

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

Google Script Used In New Phishing Scams

June 2, 2025

Latest Alerts

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

Subscribe to our newsletter

    Latest Incidents

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial