Security News > 2022 > August > WordPress sites hacked with fake Cloudflare DDoS alerts pushing malware
WordPress sites are being hacked to display fake Cloudflare DDoS protection pages to distribute malware that installs the NetSupport RAT and the RaccoonStealer password-stealing Trojan.
DDoS protection screens are commonplace on the internet, protecting sites from bots that ping them with bogus requests, aiming to overwhelm them with garbage traffic.
As detailed in a report by Sucuri, threat actors are hacking poorly protected WordPress sites to add a heavily obfuscated JavaScript payload that displays a fake Cloudflare protection DDoS screen.
Iso' file to the computer, which pretends to be a tool required to bypass the DDoS verification.
Ultimately, this causes a chain of scripts to run that display the fake DDoS code needed to view the site, as well as installing the NetSupport RAT, a remote access trojan used extensively in malicious campaigns today.
Internet users can protect themselves from such threats by enabling strict script blocking settings on their browser, although that will break the functionality of almost all sites.
News URL
Related news
- UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App (source)
- WP3.XYZ malware attacks add rogue admins to 5,000+ WordPress sites (source)
- FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation (source)
- Cloudflare mitigated a record-breaking 5.6 Tbps DDoS attack (source)