in , ,

Hackers Target WordPress Sites to Distribute Malware – Stay Safe!

Hackers Target WordPress Sites to Distribute Malware

Hackers are abusing outdated WordPress versions and vulnerable plug-ins to compromise thousands of websites. Their objective is to deceive visitors into downloading and introducing malware, according to security researchers.

A Live and Widespread Attack

Simon Wijckmans, founder and CEO of web security company c/side, which discovered the attack, confirmed that the hacking campaign is still ongoing.

Want a Free Website

The malware is planned to take passwords and personal information from both Windows and Mac users. A few of the compromised websites rank among the most well-known on the internet, making the risk even more alarming.

A “Spray and Pay” Cyberattack

Himanshu Anand, a security researcher at c/side, portrays the campaign as a “spray and pay” attack, meaning hackers point to contaminate as numerous users as possible or maybe focus on particular individuals.

When a user visits an infected WordPress site, the content changes to show a fake Chrome browser upgrade page. This prompts the visitor to download a malicious file disguised as an overhaul, with diverse adaptations for Windows and macOS.

WordPress Developer Alerted

Wijckmans reported the attack to Automattic, the company behind WordPress.com, sharing details of the malicious domains. While Automattic acknowledged receipt of the report, spokesperson Megan Fox declined to comment.

Read More: WordPress AMP Plugin Vulnerability Affects Up To 100,000+ Sites

Over 10,000 Websites Affected

C/side’s investigation revealed that over 10,000 websites have been compromised. By crawling the internet and performing reverse DNS lookups, the security firm identified multiple domains hosting malicious scripts.

They were unable to verify the exact number of affected sites but confirmed at least one WordPress website was still displaying malicious content.

Malware Targeting Windows and Mac Users

The attack deploys two distinct types of malware:

  • Amos (Atomic Stealer): Targets macOS users, stealing passwords, session cookies, crypto wallets, and other sensitive data.
  • SocGholish: Targets Windows users with similar infostealing capabilities.

Amos: A Leading macOS Threat

In May 2023, cybersecurity firm SentinelOne classified Amos as an infostealer. Hackers have been selling access to this malware on Telegram, according to cybersecurity firm Cyble.

Patrick Wardle, a macOS security expert and co-founder of Apple-focused cybersecurity startup DoubleYou, described Amos as “the most prolific stealer on macOS.” He explained that while installing the malware requires users to bypass Apple’s built-in security, it remains a significant threat.

How to Stay Safe

Although this attack relies on tricking users into downloading fake updates, it serves as a critical reminder to stay vigilant:

  • Always update Chrome through its built-in software update feature.
  • Download and install applications only from trusted sources.
  • Enable security features on your operating system to prevent unauthorized installations.

The Bigger Picture: Password Theft and Major Breaches

Password-stealing malware has been dependable for a few of the most critical cyberattacks in history. In 2024, hackers abused stolen credentials to breach corporate accounts hosted on cloud computing giant Snowflake. This highlights the progressing risks of credential theft and the significance of solid cybersecurity practices.

By remaining informed and cautious, users can decrease their chance of falling victim to these broad cyber threats.

Want a Free Website

Written by Hajra Naz

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Loading…

Alibaba launches new AI version 'better' than DeepSeek

Alibaba launches new AI version ‘better’ than DeepSeek

KP launches Prisoner Visitors Management System to Upgrade Prison Facilities