Keylogger Campaign Hits Over 2,000 WordPress Sites

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
WP-keylogger.png


Security researchers have discovered over 2,000 WordPress sites —possibly more— infected with a keylogger that's being loaded on the WordPress backend login page and a cryptojacking script (in-browser cryptocurrency miner) on their frontends.

Researchers have tied these newly discovered infected sites to a similar operation that took place in early December 2017.

The attack is quite simple. Miscreants find unsecured WordPress sites —usually running older WordPress versions or older themes and plugins— and use exploits for those sites to inject malicious code into the CMS' source code.

The malicious code includes two parts. For the admin login page, the code loads a keylogger hosted on a third-party domain. For the site's frontend, crooks load the Coinhive in-browser miner and mine Monero using the CPUs of people visiting the site.

Attackers active since April 2017
As mentioned before, this campaign has been going on since April 2017, and for most of 2017, miscreants were busy embedding banner ads on the hacked sites and loading Coinhive cryptojacking scripts disguised as fake jQuery and Google Analytics JavaScript files.

It was only in December when this group moved to the more devious practice of collecting admin credentials via a keylogger.
 
  • Like
Reactions: harlan4096

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top