The Sign1 malware campaign has emerged as a significant threat, infecting over 39,000 websites in the past six months. This malicious campaign injects unwanted redirects and popup ads, disrupting the browsing experience for visitors. Sucuri, a website security firm, uncovered the campaign after one of its clients experienced unexpected popup ads on their website, revealing the widespread impact of the malware.
The threat actors behind Sign1 exploit vulnerabilities in WordPress plugins and custom HTML widgets to inject malicious scripts, rather than modifying core WordPress files directly. This approach allows them to evade detection and compromise a large number of websites without raising suspicion. Sucuri’s analysis indicates that the malware employs sophisticated techniques, including time-based randomization of URLs and dynamic script fetching, to bypass security measures and maintain persistence.
Sign1’s evolution over the past six months showcases its adaptability and resilience to detection and blocking efforts. The campaign has intensified with each new version released, with Sucuri detecting over 39,000 infected websites and ongoing attacks claiming an additional 2,500 sites since January 2024. This escalation underscores the need for website owners to prioritize security measures such as strong passwords, regular plugin updates, and the removal of unnecessary add-ons to mitigate the risk of infection.
Sucuri advises website owners to remain vigilant and proactive in safeguarding their sites against Sign1 and similar malware campaigns. By implementing robust security practices and staying informed about emerging threats, website administrators can reduce the likelihood of compromise and protect their visitors from the disruptive and potentially harmful effects of malware infections.