Article Details
Scrape Timestamp (UTC): 2025-03-06 10:00:54.801
Source: https://thehackernews.com/2025/03/over-1000-wordpress-sites-infected-with.html
Original Article Text
Click to Toggle View
Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access. Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. "Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed," c/side researcher Himanshu Anand said in a Wednesday analysis. The malicious JavaScript code has been found to be served via cdn.csyndication[.]com. As of writing, as many as 908 websites contain references to the domain in question. The functions of the four backdoors are explained below - To mitigate the risk posed by the attacks, it's advised that users delete unauthorized SSH keys, rotate WordPress admin credentials, and monitor system logs for suspicious activity. The development comes as the cybersecurity company detailed another malware campaign has compromised more than 35,000 websites with malicious JavaScript that "fully hijacks the user's browser window" to redirect site visitors to Chinese-language gambling platforms. "The attack appears to be targeting or originating from regions where Mandarin is common, and the final landing pages present gambling content under the 'Kaiyun' brand. The redirections occur through JavaScript hosted on five different domains, which serves as a loader for the main payload responsible for performing the redirects - The findings also follow a new report from Group-IB about a threat actor dubbed ScreamedJungle that injects a JavaScript code-named Bablosoft JS into compromised Magento websites to collect fingerprints of visiting users. More than 115 e-commerce sites are believed to be impacted to date. The injected script is "part of the Bablosoft BrowserAutomationStudio (BAS) suite," the Singaporean company said, adding it "contains several other functions to collect information about the system and browser of users visiting the compromised website." It's said that the attackers are exploiting known vulnerabilities affecting vulnerable Magento versions (e.g., CVE-2024-34102 aka CosmicSting and CVE-2024-20720) to breach the websites. The financially motivated threat actor was first discovered in the wild in late May 2024. "Browser fingerprinting is a powerful technique commonly used by websites to track user activities and tailor marketing strategies," Group-IB said. "However, this information is also exploited by cybercriminals to mimic legitimate user behavior, evade security measures, and conduct fraudulent activities."
Daily Brief Summary
Over 1,000 WordPress-powered websites have been compromised with malicious JavaScript code installing multiple backdoors.
The malicious JavaScript is being served from cdn.csyndication[.]com, affecting as many as 908 sites.
Security experts recommend deleting unauthorized SSH keys, rotating WordPress admin credentials, and monitoring system logs for signs of further malicious activity.
The JavaScript backdoors offer attackers various re-entry points even if one is detected and neutralized.
In a related cybersecurity threat, over 35,000 websites are redirected to gambling sites via malicious JavaScript linked to Chinese-language platforms.
Another campaign involves ScreamedJungle, a threat actor using JavaScript to collect browser fingerprints from users visiting over 115 e-commerce sites on the Magento platform.
These sites are compromised through the exploitation of known vulnerabilities in Magento.
Cybercriminals use browser fingerprinting not only to personalize marketing but also to mimic legitimate user behaviors and conduct fraudulent transactions.