Alert: 1,000+ WordPress Sites Compromised with Stealthy JavaScript Backdoors Giving Hackers Persistent Control

Alert: 1,000+ WordPress Sites Compromised with Stealthy JavaScript Backdoors Giving Hackers Persistent Control

# WordPress Backdoor Campaign Infects Over 1,000 Websites

More than 1,000 WordPress websites have been compromised with malicious JavaScript code that installs four separate backdoors, according to security researcher Himanshu Anand from c/side. The attack uses multiple backdoors to ensure persistent access even if one is discovered and removed.

The malicious code is being served through cdn.csyndication[.]com, with at least 908 websites currently referencing this domain. The four backdoors function as follows:

1. Uploads and installs a fake plugin called “Ultra SEO Processor” to execute attacker commands
2. Injects malicious JavaScript into the wp-config.php file
3. Adds attacker-controlled SSH keys to enable persistent remote access
4. Executes remote commands and fetches additional payloads from gsocket[.]io, likely to establish reverse shells

Security experts recommend that affected users delete unauthorized SSH keys, change WordPress admin credentials, and monitor system logs for suspicious activity.

In a separate campaign, over 35,000 websites have been infected with malicious JavaScript that redirects visitors to Chinese gambling platforms. This attack targets Mandarin-speaking regions and operates through five different domains serving as loaders for the redirection payload.

Additionally, Group-IB has identified a threat actor named ScreamedJungle that targets Magento e-commerce sites. This group injects “Bablosoft JS” code to collect browser fingerprinting data from visitors. At least 115 e-commerce sites have been compromised through known Magento vulnerabilities, including CVE-2024-34102 and CVE-2024-20720. The campaign, first detected in May 2024, demonstrates how browser fingerprinting techniques can be weaponized for fraudulent activities.

Share This Article