Breach, Vulnerability Management

DollyWay Campaign Compromises Thousands of WordPress Sites

Web Coder working on laptop computer in office

BleepingComputer reports that more than 20,000 WordPress sites worldwide have been compromised as part of the DollyWay World Domination malware operation that has been ongoing since 2016.

While previous iterations of the DollyWay campaign spread ransomware and banking Trojans, the latest DollyWay v3 campaign targets WordPress sites leveraging vulnerable plugins and themes. The attacks facilitated redirections to fraudulent cryptocurrency, gambling, dating, and sweepstakes sites, an analysis from GoDaddy found.

After initially infiltrating websites using the 'wp_enqueue_script' to enable secondary script loading, DollyWay v3 obtains site visitor referrer data to facilitate Traffic Direction System loading. Then, the attackers choose a trio of random sites to serve as TDS nodes containing concealed JavaScript that redirects to VexTrio or LosPollos scam pages, said GoDaddy researchers.

DollyWay ensures persistence by automating site reinfection following page loads, according to researcher Denis Sinegubko, who also noted that the campaign's obfuscation of installed WPCode and admin users further complicates its removal from impacted websites.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.