WordPress sites targeted in new malware campaign: a threat to online security.


January 15, 2025 by our News Team

A new malware campaign targeting WordPress sites has been discovered, potentially compromising over 5,000 websites and stealing sensitive data through a malicious plugin.

  • Targets WordPress sites specifically
  • Collects sensitive data from compromised websites
  • Can be prevented by updating installations and implementing security measures


A new malware campaign has recently been discovered, targeting WordPress-based websites. This campaign has potentially compromised over 5,000 websites. It’s a concerning development, but let’s break it down and see what we can do to protect ourselves.

According to the cybersecurity company c/side, they have uncovered a new malware campaign that specifically targets WordPress sites. The attack starts with an unknown initial vector, which leads to the creation of an administrator account. This account is then used to install a malicious plugin that steals data from the compromised websites.

The malware has been given the name “wp3,” derived from the domain used to establish the connection and download the necessary code to create the administrator account. Once the malware is installed, it proceeds to install a malicious plugin from the same source. This plugin enables a wider range of activities on the site and allows the attackers to steal data.

So, what is the purpose of this malware? The researchers believe its main goal is to collect sensitive data, such as administrator login credentials, error logs, and user data from registered users on the site. It’s a sobering reminder of the importance of safeguarding our personal information online.

To make matters worse, the malware tries to evade detection by disguising its activities as a simple image request. In the server logs, it appears as if WordPress is merely requesting an image, but in reality, it’s downloading the malware. Sneaky, right?

Now, how can we protect ourselves from this attack? Since the origin of the malware is still unknown, it’s crucial for WordPress site administrators to take immediate action. Start by updating all installations to the latest version. This will ensure that any known vulnerabilities are patched.

Additionally, implementing security measures like rotating encryption keys, using strong passwords, and enabling two-factor authentication whenever possible can significantly enhance your site’s security. These steps may seem small, but they can make a world of difference in keeping your site safe.

In conclusion, this new malware campaign targeting WordPress-based websites is a cause for concern. It’s a reminder that we must remain vigilant and take proactive steps to protect our online presence. By staying informed and implementing the necessary security measures, we can reduce the risk of falling victim to such attacks. Stay safe out there, folks!

About Our Team

Our team comprises industry insiders with extensive experience in computers, semiconductors, games, and consumer electronics. With decades of collective experience, we’re committed to delivering timely, accurate, and engaging news content to our readers.


Leave a Reply