Cascading Redirects: Unmasking a Multi-Site JavaScript Malware Campaign
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
A recent investigation uncovered a malicious JavaScript injection affecting WordPress websites, redirecting visitors to unwanted third-party domains. The attack vector involves a two-stage redirection process, injecting code into theme files and loading external scripts. The malware creates hidden elements to force redirects, potentially leading to phishing pages, malvertising, exploit kits, or scam sites. At least 31 infected websites were identified, with domains like awards2today[.]top and chilsihooveek[.]net involved. The infection methods include compromised admin accounts, exploited vulnerabilities, inadequate file permissions, and hidden PHP backdoors. Impacts include traffic loss, reputation damage, SEO blacklisting, and risks of further infections. Detection involves inspecting network activity and file modifications, while prevention measures include regular security audits, updates, strong passwords, and web application firewalls.
OPENCTI LABELS :
wordpress,javascript injection,malicious redirects,traffic hijacking,theme file modification,two-stage attack,seo damage
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Cascading Redirects: Unmasking a Multi-Site JavaScript Malware Campaign