Crooks compromise WordPress sites, spread infostealers
Briefly

Crooks compromise WordPress sites, spread infostealers
"Researchers at Rapid7 say the scheme works by injecting malicious code into compromised sites, which then serve visitors a convincing fake Cloudflare CAPTCHA page. Instead of simply proving you're not a robot, the prompt instructs users to copy and run a command on their machine - a step that ultimately triggers the download of credential-stealing malware."
"The trick works because the attack starts on websites that otherwise look perfectly legitimate. Visitors think they're just clearing yet another Cloudflare bot check - the sort that litters the modern web - when in fact they're being talked through the first step of infecting their own machine."
"The large-scale execution of the compromise across completely unrelated WordPress instances suggests a high level of automation by the threat actor and is likely part of an organized long-term criminal effort."
Cybercriminals have compromised numerous legitimate WordPress websites, including a US Senate candidate's official webpage, as part of a coordinated infostealer operation. The attack injects malicious code that displays a convincing fake Cloudflare CAPTCHA verification page to visitors. Rather than simply proving they're human, users are instructed to copy and execute a command on their machine, which triggers the download of credential-stealing malware. This technique exploits the ClickFix social engineering playbook, where victims unknowingly infect their own systems while believing they're completing a routine security verification. The widespread compromise across unrelated WordPress instances indicates automated, large-scale attacks by organized criminals. Once executed, the infostealer malware quietly harvests sensitive data including browser-stored credentials from infected machines.
Read at Theregister
Unable to calculate read time
[
|
]