• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
wordpress sites turned weapon: how vextrio and affiliates run a

WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

You are here: Home / General Cyber Security News / WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
June 12, 2025

The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that’s designed to distribute malicious content.

“VexTrio is a group of malicious adtech companies that distribute scams and harmful software via different advertising formats, including smartlinks and push notifications,” Infoblox said in a deep-dive report shared with The Hacker News.

Some of the malicious adtech companies under VexTrio Viper include Los Pollos, Taco Loco, and Adtrafico. These companies operate what’s called a commercial affiliate network that connects malware actors whose websites unsuspecting users land on and so-called “advertising affiliates” who offer various forms of illicit schemes like gift card fraud, malicious apps, phishing sites, and scams.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Put differently, these malicious traffic distribution systems are designed to redirect victims to their destinations through a SmartLink or direct offer. Los Pollos, per the DNS threat intelligence firm, enlists malware distributors (aka publishing affiliates) with promises of high-paying offers, whereas Taco Loco specializes in push monetization and recruits advertising affiliates.

Another notable component of these attacks is the compromise of WordPress websites to inject malicious code that’s responsible for initiating the redirection chain, ultimately leading visitors to VexTrio scam infrastructure. Examples of such injections include Balada, DollyWay, Sign1, and DNS TXT record campaigns.

“These scripts redirect site visitors to various scam pages through traffic broker networks associated with VexTrio, one of the largest known cybercriminal affiliate networks that leverages sophisticated DNS techniques, traffic distribution systems, and domain generation algorithms to deliver malware and scams across global networks,” GoDaddy noted in a report published in March 2025.

VexTrio’s operations suffered a blow around mid-November 2024 after Qurium revealed that the Swiss-Czech adtech company Los Pollos was part of VexTrio, causing Los Pollos to cease their push link monetization. This, in turn, triggered an exodus, causing threat actors that relied heavily on the Los Pollos network to move to alternate redirect destinations such as Help TDS and Disposable TDS.

Infoblox’s analysis of 4.5 million DNS TXT record responses from compromised websites over a six-month period has revealed that the domains that were part of the DNS TXT record campaigns could be classified into two sets, each with its own distinct command-and-control (C2) server.

“Both servers were hosted in Russian-connected infrastructure, but neither their hosting nor their TXT responses overlapped,” the company said. “Each set maintained different redirect URL structures, even though they both originally led to VexTrio and subsequently to the Help TDS.”

Further evidence has uncovered that both Help TDS and Disposable TDS are one and the same, and that the services enjoyed an “exclusive relationship” with VexTrio until November 2024. Help TDS, which historically redirected traffic to VexTrio domains, has since shifted to Monetizer, a monetization platform that uses TDS technology to connect web traffic from publisher affiliates to advertisers.

Cybersecurity

“The Help TDS has a strong Russian nexus, with hosting and domain registration frequently done via Russian entities,” Infoblox said, describing the operators as possibly independent. “It does not have the full-blown functionality of the VexTrio TDSs and has no obvious commercial ties beyond its eerie connections with VexTrio.”

VexTrio is one among the many TDSs that have been outed as commercial adtech firms, the others being Partners House, BroPush, RichAds, Admeking, and RexPush. Many of these are geared towards push notification services by making use of Google Firebase Cloud Messaging (FCM) or Push API-based custom-developed scripts to distribute links to malicious content via push notifications.

“Hundreds of thousands of compromised websites around the world every year redirect victims to the tangled web of VexTrio and VexTrio-affiliate TDSs,” the company said.

“VexTrio and the other affiliate advertising companies know who the malware actors are, or they at least have enough information to track them down. Many of the companies are registered in countries that require some degree of ‘know your customer’ (KYC), but even without these requirements, publishing affiliates are vetted by their customer managers.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «new tokenbreak attack bypasses ai moderation with single character text changes New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
Next Post: Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware apple zero click flaw in messages exploited to spy on journalists»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.