Over 20,000 WordPress sites hit by damaging malware campaign

WordPress on a laptop
Image credit: Shutterstock (Image credit: Shutterstock)

  • GoDaddy found a malicious campaign infecting 20,000 WordPress sites
  • It is called DollyWay, and it is super persistent
  • DollyWay redirects visitors to fake gambling and crypto sites

A long-running, super persistent malicious campaign that infected more than 20,000 WordPress websites worldwide has been uncovered by experts.

Security researchers from GoDaddy dubbed it “DollyWay World Domination”, which had the goal of redirecting vicims to fake dating, gambling, crypto, and sweepstakes sites, although in the past the campaign was also used to spread ransomware and banking trojans.

DollyWay has been active since at least 2016, GoDaddy says, adding today it generates 10 million impressions every month, raking in solid earnings for the operators. Over the years, it also improved evasion, reinfection, and monetization strategies.

A single threat actor

DollyWay is currently in its third iteration, while the previous ones were more focused on malware distribution and phishing.

To compromise WordPress websites, DollyWay’s operators looked for n-day vulnerabilities in plugins and themes for the platform. They also employed a Traffic Direction System (TD) to filter and redirect users based on their location, device, and referrer. To make sure attackers get paid per redirection, they used VexTrio and LosPollos networks.

When it comes to obfuscation, DollyWay was doing a number of things: It redirected users only after they clicked on something, in order to evade passive security scans. It also wasn’t redirecting any logged-in WordPress users, bots, and direct visitors who were coming without referrers. It was also quite persistent, GoDaddy said, since reinfection would occur with every page load.

At first, GoDaddy’s researchers were under the impression that they were analyzing multiple groups and different campaigns.

"While previously thought to be separate campaigns, our research reveals these attacks share common infrastructure, code patterns, and monetization methods - all appearing to be connected to a single, sophisticated threat actor,” the researchers concluded. “The operation was named after the following tell-tale string, which is found in some variations of the malware: define('DOLLY_WAY', 'World Domination')."

Via BleepingComputer

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
Thousands of WordPress websites hit in new malware attack, here's what we know
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
Over 10,000 WordPress sites found showing fake Google browser update pages to spread malware
A close-up of an interent search bar with 'http://ww' visible
Major website hijacking scam sees over 35,000 sites attacked, redirected to gambling sites, so be on your guard
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
A person holding a credit card in one hand while typing on a laptop keyboard with the other.
WordPress users targeted by devious new credit card skimmer malware
WordPress
Another top WordPress plugin found carrying critical security flaws
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
WordPress on a laptop
Over 20,000 WordPress sites hit by damaging malware campaign
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedly left users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Latest in News
An Nvidia GeForce RTX 4060 Ti
Nvidia RTX 5060 Ti could be delayed to mid-April and RTX 5060 to mid-May – is AMD starting to look like a clear winner in the battle of Blackwell vs RDNA 4 GPUs?
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Core Time 2 + iPhone 15 blue
Pebble is taking the fight to the Apple Watch – as its founder calls for action
The Google Pixel 9a
The Google Pixel 9a’s AI has a RAM problem
Xbox Wireless Controller
Microsoft is adding a powerful new feature for using Xbox controllers with Windows 11
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware