Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers Exploit WordPress Sites to Spread New Trojan
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers Exploit WordPress Sites to Spread New Trojan
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Hackers Exploit WordPress Sites to Spread New Trojan

Security

Hackers Exploit WordPress Sites to Spread New Trojan

Threat actors are using WordPress websites to distribute dangerous malware. Here's how it works and what to watch out for.

Marco Rizal
Last updated: September 15, 2024 12:17 pm
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Hackers Exploit WordPress Sites to Spread New Trojan
SHARE

Cybersecurity experts at Sucuri recently discovered that hackers are using WordPress websites to spread a dangerous type of malware known as the ClearFake Trojan.

According to researchers, this malware is created with the intention of deceiving users into unknowingly installing harmful software on their computers.

Some of the consequences of falling victim to this malware can be quite severe, potentially resulting in ransomware attacks and other detrimental outcomes.

The attack starts with a fake error message that appears when users visit an infected website.

The message states that there is a problem with the webpage display and advises users to install a “root certificate” as a solution.

Then the prompt offers a button labeled “Fix it,” which, when clicked, leads to additional instructions that may appear technical and perplexing.

This is the first sign that something is wrong. The term “root certificate” might sound official, but legitimate websites do not ask users to install these.

image 28
Credit: Sucuri

The scammers rely on people not questioning these instructions and following them blindly.

When the user clicks the “How to fix” button, the instructions become more complex and detailed.

The user is instructed to open Windows PowerShell, a robust system management tool, and execute specific commands. These steps are intended to download and install malware without the user's awareness.

Once installed, the malware reaches out to a remote server to download a malicious file named “zilla.exe.”

This file is a Trojan, a type of malware that disguises itself as something harmless but is designed to steal sensitive information or cause other damage.

image 29
Credit: Sucuri

The hackers used a GitHub account to host the malicious file, which had been in operation for approximately six months prior to being reported.

Security researchers found that this attack is part of a broader campaign known as ClearFake.

It often leads to further infections, including ransomware attacks, which can lock users out of their files until they pay a ransom.

The hackers managed to insert the fake pop-up directly into the main index.php file of the WordPress website, which is an important part of how WordPress sites operate.

The malware was made adaptable by translating the pop-up message into 42 different languages, making it easily understandable for users worldwide.

The message will be displayed in the victim's native language, regardless of their location, which adds to its influence.

More Stories

Russia Denies Flaws In E-Summons System

Russian-Linked Crypto Scammers Are Targeting The 2024 US Election

Cloudflare Fends Off History’s Largest DDoS Attack

Widespread PDF Email Scam Where Hacker Knows Your Phone Number

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Microsoft Employee Data Breach Over 2000 Employees Data Leaked

Microsoft Employee Data Breach; Over 2,000 Employees’ Data Leaked

Turkeys Massive Data Breach Confirmed With a Shrug From Officials

Turkey’s Massive Data Breach Confirmed With a Shrug From Officials

Norton Antivirus Jumps on Avasts Engine

One Less Scanner? Norton Antivirus Jumps on Avast’s Engine

Hacktivists Shut Down French Government

Hacktivists Shut Down French Government Websites in Protest of Telegram CEO’s Arrest

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?