Major Cybersecurity Threats Hit WordPress and Magento Sites Worldwide

Article Highlights
Off On

The digital landscape is constantly evolving, bringing with it new challenges, particularly in the realm of cybersecurity. Recent reports have unveiled a disconcerting surge in cyberattacks targeting WordPress and Magento websites, affecting thousands of sites globally. Over a thousand WordPress websites have fallen victim to an intricate infiltration involving a third-party JavaScript code, which cunningly embeds four different backdoors. This multifaceted attack ensures that if one entry point gets discovered and removed, other access points remain active, allowing the attackers to maintain their presence on the compromised sites.

Meanwhile, a broader malware campaign has compromised more than 35,000 websites, further exacerbating concerns in the cybersecurity community. This particular attack diverts unsuspecting visitors to Mandarin-language gambling sites by utilizing JavaScript spread across five distinct domains. The malicious campaign predominantly targets regions where Mandarin is widely spoken, promoting gambling entities under the ‘Kaiyun’ brand. Additionally, another group of hackers has been actively exploiting vulnerabilities in Magento websites. Known as ScreamedJungle, this threat actor injects Bablosoft JS code into the sites, gathering intricate user fingerprints for potential fraudulent use. This article delves into the sophisticated nature of these cyber threats and underscores the critical need for robust security measures to protect against such attacks.

Multiple Backdoors in WordPress Sites

A recent cybersecurity breach has impacted over a thousand WordPress websites, injecting them with a third-party JavaScript code that facilitates four distinct backdoors. These backdoors collectively work to ensure continual access for the attackers, rendering the websites persistently vulnerable. Among the tactics employed is the installation of a fake plugin called “Ultra SEO Processor.” This faux plugin provides a conduit for executing commands on the compromised sites, allowing the attackers to manipulate the site’s operations covertly. Another method involves injecting malicious JavaScript into the wp-config.php file, thus embedding executable code directly into the site’s configuration.

Additionally, attackers add a compromised SSH key, which grants them the ability to access the site remotely and without detection. This unauthorized SSH key serves as a secure gateway for the perpetrators, enabling them to execute remote commands and fetch additional malicious payloads when needed. The fourth backdoor utilizes these remote commands to maintain a robust grip on the infected sites, ensuring they remain under the attackers’ control. This intricate web of multiple entry points illustrates the evolving sophistication of cyber threats and highlights the urgent necessity for website administrators to engage in continual monitoring and immediate remediation to protect their sites from such multifaceted attacks.

Browser Hijacking and Gambling Redirection

The second significant cybersecurity threat has cast a wider net, compromising over 35,000 websites by employing a different form of malicious activity. This attack hijacks browsers, redirecting users to Mandarin-language gambling sites using JavaScript hosted across several domains. The targeted campaign seems focused on regions with a high prevalence of Mandarin speakers, leveraging the ‘Kaiyun’ brand to propagate gambling content. The pervasive nature of this attack, which spans thousands of websites, underscores the extensive reach and potential impact on unsuspecting users, driving them to potentially harmful or deceitful destinations.

What makes this malware campaign particularly concerning is its ability to seamlessly integrate with legitimate sites, making detection and mitigation increasingly challenging. The malicious JavaScript code, cleverly distributed across five different domains, facilitates the redirection process, compromising user experience and potentially leading to further security risks. This widespread browser hijacking demonstrates the diversity and adaptability of current cyber threats, emphasizing the need for comprehensive security protocols and vigilant monitoring to safeguard both the integrity of websites and the privacy of their users.

Magento Vulnerabilities and Bablosoft JS Injections

In another alarming development, the cybersecurity firm Group-IB has reported a malicious campaign targeting Magento websites, orchestrated by a threat actor known as ScreamedJungle. This attack involves the injection of Bablosoft JS code into vulnerable sites, which gathers detailed user fingerprints. These fingerprints include crucial system and browser information, setting the stage for fraudulent activities. The attackers have exploited known vulnerabilities, including CVE-2024-34102 and CVE-2024-20720, to infiltrate Magento websites effectively.

The ability to collect detailed user fingerprints allows attackers to gain sophisticated insights into user behaviors and device specifics, potentially facilitating identity theft or further infiltrations. The exploitation of these specific vulnerabilities underscores the importance of timely patching and updates within the website management ecosystem. Administrators must remain vigilant and proactive in identifying and mitigating potential security gaps to shield their platforms from such intrusions. The campaign targeting Magento sites serves as a stark reminder of the critical stakes involved in maintaining up-to-date security measures in the ever-evolving digital landscape.

Conclusion and Recommendations for Web Security

The digital world is always changing, bringing along new challenges, especially in cybersecurity. Recent reports reveal a worrying rise in cyberattacks on WordPress and Magento websites, impacting thousands globally. Over a thousand WordPress sites have been breached through a complex attack using third-party JavaScript code that embeds four different backdoors. This crafty tactic ensures that even if one entry point is found and removed, others stay active, allowing attackers to persist on compromised sites.

Additionally, a larger malware campaign has compromised over 35,000 websites, heightening concerns in the cybersecurity community. This attack redirects unsuspecting visitors to Mandarin-language gambling sites using JavaScript spread across five domains. The malicious campaign primarily targets Mandarin-speaking regions, promoting gambling entities under the ‘Kaiyun’ brand. Another hacker group, known as ScreamedJungle, exploits vulnerabilities in Magento sites by injecting Bablosoft JS code to gather detailed user fingerprints for potential fraud. This article highlights the sophisticated nature of these cyber threats and stresses the urgent need for strong security measures to guard against such attacks.

Explore more

AI Redefines Software Engineering as Manual Coding Fades

The rhythmic clacking of mechanical keyboards, once the heartbeat of Silicon Valley innovation, is rapidly being replaced by the silent, instantaneous pulse of automated script generation. For decades, the ability to hand-write complex logic in languages like Python, Java, or C++ served as the ultimate gatekeeper to a world of prestige and high compensation. Today, that gate is being dismantled

Is Writing Code Becoming Obsolete in the Age of AI?

The 3,000-Developer Question: What Happens When the Keyboard Goes Quiet? The rhythmic tapping of mechanical keyboards that once echoed through every software engineering hub has gradually faded into a thoughtful silence as the industry pivots toward autonomous systems. This transformation was the focal point of a recent gathering of over 3,000 developers who sought to define their roles in a

Skills-Based Hiring Ends the Self-Inflicted Talent Crisis

The persistent disconnect between a company’s inability to fill open roles and the record-breaking volume of incoming applications suggests that modern recruitment has become its own worst enemy. While 65% of HR leaders believe the hiring power dynamic has finally shifted back in their favor, a staggering 62% simultaneously claim they are trapped in a persistent talent crisis. This paradox

AI and Gen Z Are Redefining the Entry-Level Job Market

The silent hum of a server rack now performs the tasks once reserved for the bright-eyed college graduate clutching a fresh diploma and a stack of business cards. This mechanical evolution represents a fundamental dismantling of the traditional corporate hierarchy, where the entry-level role served as a primary training ground for future leaders. As of 2026, the concept of “paying

How Can Recruiters Shift From Attraction to Seduction?

The traditional recruitment funnel has transformed into a complex psychological maze where simply posting a vacancy no longer guarantees a single qualified applicant. Talent acquisition teams now face a reality where the once-reliable job boards remain silent, reflecting a fundamental shift in how professionals view career mobility. This quietude signifies the end of a passive era, as the modern talent