Data Security

5,000 WordPress Sites Hit By WP3.XYZ Malware Campaign

More than 5,000 WordPress sites hit by WP3.XYZ malware campaign. (Adobe Stock)

More than 5,000 WordPress sites worldwide have been breached to facilitate admin account creation, malicious plugin injection, and data exfiltration as part of a novel attack campaign involving malware retrieved from the wp3[.]xyz domain, according to BleepingComputer.

Impacted websites, whose initial means of compromise remains uncertain, had a script retrieved from the wp3[.]xyz domain enabling the establishment of a deceptive admin account before installing an information-stealing plugin targeting admin credentials, logs, and other sensitive details, according to a report from c/side, a webscript security firm.

These findings should prompt website admins to leverage firewalls and other security systems to deter the wp3[.]xyz domain. Admins have also been urged to evaluate privileged accounts and install plugins to address suspicious activity, as well as fortify WordPress sites' cross-site request forgery defenses through server-side validation, unique token generation, and periodic regeneration. The researchers also recommended teams install multi-factor authentication.

You can skip this ad in 5 seconds