Major Cybersecurity Threats Hit WordPress and Magento Sites Worldwide

Article Highlights
Off On

The digital landscape is constantly evolving, bringing with it new challenges, particularly in the realm of cybersecurity. Recent reports have unveiled a disconcerting surge in cyberattacks targeting WordPress and Magento websites, affecting thousands of sites globally. Over a thousand WordPress websites have fallen victim to an intricate infiltration involving a third-party JavaScript code, which cunningly embeds four different backdoors. This multifaceted attack ensures that if one entry point gets discovered and removed, other access points remain active, allowing the attackers to maintain their presence on the compromised sites.

Meanwhile, a broader malware campaign has compromised more than 35,000 websites, further exacerbating concerns in the cybersecurity community. This particular attack diverts unsuspecting visitors to Mandarin-language gambling sites by utilizing JavaScript spread across five distinct domains. The malicious campaign predominantly targets regions where Mandarin is widely spoken, promoting gambling entities under the ‘Kaiyun’ brand. Additionally, another group of hackers has been actively exploiting vulnerabilities in Magento websites. Known as ScreamedJungle, this threat actor injects Bablosoft JS code into the sites, gathering intricate user fingerprints for potential fraudulent use. This article delves into the sophisticated nature of these cyber threats and underscores the critical need for robust security measures to protect against such attacks.

Multiple Backdoors in WordPress Sites

A recent cybersecurity breach has impacted over a thousand WordPress websites, injecting them with a third-party JavaScript code that facilitates four distinct backdoors. These backdoors collectively work to ensure continual access for the attackers, rendering the websites persistently vulnerable. Among the tactics employed is the installation of a fake plugin called “Ultra SEO Processor.” This faux plugin provides a conduit for executing commands on the compromised sites, allowing the attackers to manipulate the site’s operations covertly. Another method involves injecting malicious JavaScript into the wp-config.php file, thus embedding executable code directly into the site’s configuration.

Additionally, attackers add a compromised SSH key, which grants them the ability to access the site remotely and without detection. This unauthorized SSH key serves as a secure gateway for the perpetrators, enabling them to execute remote commands and fetch additional malicious payloads when needed. The fourth backdoor utilizes these remote commands to maintain a robust grip on the infected sites, ensuring they remain under the attackers’ control. This intricate web of multiple entry points illustrates the evolving sophistication of cyber threats and highlights the urgent necessity for website administrators to engage in continual monitoring and immediate remediation to protect their sites from such multifaceted attacks.

Browser Hijacking and Gambling Redirection

The second significant cybersecurity threat has cast a wider net, compromising over 35,000 websites by employing a different form of malicious activity. This attack hijacks browsers, redirecting users to Mandarin-language gambling sites using JavaScript hosted across several domains. The targeted campaign seems focused on regions with a high prevalence of Mandarin speakers, leveraging the ‘Kaiyun’ brand to propagate gambling content. The pervasive nature of this attack, which spans thousands of websites, underscores the extensive reach and potential impact on unsuspecting users, driving them to potentially harmful or deceitful destinations.

What makes this malware campaign particularly concerning is its ability to seamlessly integrate with legitimate sites, making detection and mitigation increasingly challenging. The malicious JavaScript code, cleverly distributed across five different domains, facilitates the redirection process, compromising user experience and potentially leading to further security risks. This widespread browser hijacking demonstrates the diversity and adaptability of current cyber threats, emphasizing the need for comprehensive security protocols and vigilant monitoring to safeguard both the integrity of websites and the privacy of their users.

Magento Vulnerabilities and Bablosoft JS Injections

In another alarming development, the cybersecurity firm Group-IB has reported a malicious campaign targeting Magento websites, orchestrated by a threat actor known as ScreamedJungle. This attack involves the injection of Bablosoft JS code into vulnerable sites, which gathers detailed user fingerprints. These fingerprints include crucial system and browser information, setting the stage for fraudulent activities. The attackers have exploited known vulnerabilities, including CVE-2024-34102 and CVE-2024-20720, to infiltrate Magento websites effectively.

The ability to collect detailed user fingerprints allows attackers to gain sophisticated insights into user behaviors and device specifics, potentially facilitating identity theft or further infiltrations. The exploitation of these specific vulnerabilities underscores the importance of timely patching and updates within the website management ecosystem. Administrators must remain vigilant and proactive in identifying and mitigating potential security gaps to shield their platforms from such intrusions. The campaign targeting Magento sites serves as a stark reminder of the critical stakes involved in maintaining up-to-date security measures in the ever-evolving digital landscape.

Conclusion and Recommendations for Web Security

The digital world is always changing, bringing along new challenges, especially in cybersecurity. Recent reports reveal a worrying rise in cyberattacks on WordPress and Magento websites, impacting thousands globally. Over a thousand WordPress sites have been breached through a complex attack using third-party JavaScript code that embeds four different backdoors. This crafty tactic ensures that even if one entry point is found and removed, others stay active, allowing attackers to persist on compromised sites.

Additionally, a larger malware campaign has compromised over 35,000 websites, heightening concerns in the cybersecurity community. This attack redirects unsuspecting visitors to Mandarin-language gambling sites using JavaScript spread across five domains. The malicious campaign primarily targets Mandarin-speaking regions, promoting gambling entities under the ‘Kaiyun’ brand. Another hacker group, known as ScreamedJungle, exploits vulnerabilities in Magento sites by injecting Bablosoft JS code to gather detailed user fingerprints for potential fraud. This article highlights the sophisticated nature of these cyber threats and stresses the urgent need for strong security measures to guard against such attacks.

Explore more