• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malware campaign exploits popup builder wordpress plugin to infect 3,900+

Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

You are here: Home / General Cyber Security News / Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites
March 12, 2024

A new malware marketing campaign is leveraging a superior-severity security flaw in the Popup Builder plugin for WordPress to inject destructive JavaScript code.

According to Sucuri, the campaign has contaminated much more than 3,900 web pages about the previous three weeks.

“These attacks are orchestrated from domains much less than a month previous, with registrations courting back to February 12th, 2024,” security researcher Puja Srivastava said in a report dated March 7.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


An infection sequences require the exploitation of CVE-2023-6000, a security vulnerability in Popup Builder that could be exploited to build rogue admin customers and set up arbitrary plugins.

Cybersecurity

The shortcoming was exploited as aspect of a Balada Injector marketing campaign previously this January, compromising no fewer than 7,000 web sites.

The most up-to-date established of attacks guide to the injection of malicious code, which will come in two different variants and is built to redirect web site people to other internet sites such as phishing and fraud webpages.

WordPress web-site house owners are advisable to retain their plugins up-to-day as properly as scan their sites for any suspicious code or end users, and conduct suitable cleanup.

“This new malware marketing campaign serves as a stark reminder of the risks of not keeping your internet site software package patched and up-to-day,” Srivastava claimed.

The progress will come as WordPress security organization Wordfence disclosed a large-severity bug in one more plugin known as Supreme Member that can be weaponized to inject destructive web scripts.

The cross-website scripting (XSS) flaw, tracked as CVE-2024-2123 (CVSS rating: 7.2), impacts all variations of the plugin, such as and prior to 2.8.3. It has been patched in version 2.8.4, released on March 6, 2024.

The flaw stems from insufficient enter sanitization and output escaping, thereby making it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will be executed just about every time a user visits them.

“Blended with the point that the vulnerability can be exploited by attackers with no privileges on a susceptible site, this signifies that there is a superior prospect that unauthenticated attackers could get administrative user entry on web sites operating the susceptible variation of the plugin when efficiently exploited,” Wordfence mentioned.

Cybersecurity

It truly is worthy of noting that the plugin maintainers tackled a similar flaw (CVE-2024-1071, CVSS score: 9.8) in edition 2.8.3 introduced on February 19.

It also follows the discovery of an arbitrary file add vulnerability in the Avada WordPress topic (CVE-2024-1468, CVSS rating: 8.8) and perhaps executes destructive code remotely. It has been fixed in edition 7.11.5.

“This makes it achievable for authenticated attackers, with contributor-stage obtain and higher than, to upload arbitrary files on the impacted site’s server which could make remote code execution possible,” Wordfence stated.

Uncovered this report fascinating? Abide by us on Twitter  and LinkedIn to examine far more distinctive information we write-up.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «south korean citizen detained in russia on cyber espionage charges South Korean Citizen Detained in Russia on Cyber Espionage Charges
Next Post: CTEM 101 – Go Beyond Vulnerability Management with Continuous Threat Exposure Management ctem 101 go beyond vulnerability management with continuous threat»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.