• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

Posted on March 6, 2025 by admin

[ad_1]

Mar 06, 2025Ravie LakshmananData Breach / Website Security

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors.

“Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed,” c/side researcher Himanshu Anand said in a Wednesday analysis.

The malicious JavaScript code has been found to be served via cdn.csyndication[.]com. As of writing, as many as 908 websites contain references to the domain in question.

Cybersecurity

The functions of the four backdoors are explained below –

  • Backdoor 1, which uploads and installs a fake plugin named “Ultra SEO Processor,” which is then used to execute attacker-issued commands
  • Backdoor 2, which injects malicious JavaScript into wp-config.php
  • Backdoor 3, which adds an attacker-controlled SSH key to the ~/.ssh/authorized_keys file so as to allow persistent remote access to the machine
  • Backdoor 4, which is designed to execute remote commands and fetches another payload from gsocket[.]io to likely open a reverse shell

To mitigate the risk posed by the attacks, it’s advised that users delete unauthorized SSH keys, rotate WordPress admin credentials, and monitor system logs for suspicious activity.

The development comes as the cybersecurity company detailed another malware campaign has compromised more than 35,000 websites with malicious JavaScript that “fully hijacks the user’s browser window” to redirect site visitors to Chinese-language gambling platforms.

“The attack appears to be targeting or originating from regions where Mandarin is common, and the final landing pages present gambling content under the ‘Kaiyun’ brand.

The redirections occur through JavaScript hosted on five different domains, which serves as a loader for the main payload responsible for performing the redirects –

  • mlbetjs[.]com
  • ptfafajs[.]com
  • zuizhongjs[.]com
  • jbwzzzjs[.]com
  • jpbkte[.]com
Cybersecurity

The findings also follow a new report from Group-IB about a threat actor dubbed ScreamedJungle that injects a JavaScript code-named Bablosoft JS into compromised Magento websites to collect fingerprints of visiting users. More than 115 e-commerce sites are believed to be impacted to date.

The injected script is “part of the Bablosoft BrowserAutomationStudio (BAS) suite,” the Singaporean company said, adding it “contains several other functions to collect information about the system and browser of users visiting the compromised website.”

It’s said that the attackers are exploiting known vulnerabilities affecting vulnerable Magento versions (e.g., CVE-2024-34102 aka CosmicSting and CVE-2024-20720) to breach the websites. The financially motivated threat actor was first discovered in the wild in late May 2024.

“Browser fingerprinting is a powerful technique commonly used by websites to track user activities and tailor marketing strategies,” Group-IB said. “However, this information is also exploited by cybercriminals to mimic legitimate user behavior, evade security measures, and conduct fraudulent activities.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Recent Posts

  • No Blind Spots: A Veteran’s Blueprint to Protect Critical Infrastructure
  • Cybersecurity as a Growth Lever: A Board-Ready Playbook for CIOs and CTOs
  • From Reaction to Readiness: Building a Cybersecurity Mindset for Proactive Defense
  • Cybersecurity Leadership in 2026: Executive Decisions that Drive Resilience and Growth
  • Implementing a Hacker’s Mindset: Build a Security Culture That Hunts, Learns, and Wins

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation