Cyber criminals are currently exploiting outdated versions of WordPress and associated plugins to target and compromise numerous websites, with the aim of deceiving unsuspecting visitors into downloading malware, a recent investigation by web security company c/side has revealed.
The founder and CEO of c/side, Simon Wijckmans, has confirmed that this hacking campaign is still ongoing and poses a significant threat to both Windows and Mac users. The hackers behind this malicious attack are embedding malware within the compromised websites, some of which are among the most popular sites on the internet.
According to Himanshu Anand, who detailed the findings of the investigation, this attack is widespread and driven by commercial motives. The campaign is characterized as a “spray and pay” tactic, targeting any individual who visits the affected websites rather than focusing on specific targets.
Key Points:
- Malicious websites prompt visitors to download and install fake updates, which are actually disguised as malicious files.
- Automattic, the company responsible for WordPress, has been alerted about the attack but has not yet commented.
- C/side has identified over 10,000 compromised websites as part of this hacking campaign.
The malware being distributed through these compromised websites consists of two main types: Amos, aimed at macOS users, and SocGholish, targeting Windows users. Amos is classified as infostealing malware that is designed to infiltrate computers, steal sensitive data, and enable hackers to access users’ accounts and digital assets.
Although this may not be the most sophisticated hacking campaign, it serves as a stark reminder for users to remain vigilant and only download software updates from trusted sources. In order to protect themselves from falling victim to such attacks, users should regularly update their browsers through official channels and be cautious when downloading any software onto their personal devices.
Password-stealing malware has been implicated in numerous high-profile data breaches in recent years, underscoring the importance of maintaining strong security practices and staying informed about potential threats in the digital landscape. As cyber threats continue to evolve and become more sophisticated, it is crucial for individuals and organizations to prioritize cybersecurity measures to safeguard their sensitive information and assets.
Leave feedback about this