Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor - Cyber Security News

A sophisticated multi-stage malware campaign has been discovered targeting WordPress websites, employing an intricate infection chain that delivers Windows trojans to unsuspecting visitors while maintaining complete invisibility to standard security checks. This campaign highlights the increasing sophistication of WordPress-based malware delivery systems and underscores the critical need for comprehensive security monitoring beyond traditional signature-based detection methods. Unlike traditional malware infections that often display visible defacements or suspicious redirects, this campaign operates entirely beneath the surface, making detection extremely challenging for website administrators and security tools alike. The malware represents a significant evolution in web-based attack techniques, combining PHP backdoors with advanced evasion mechanisms to establish persistent access to victim systems. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Upon execution, the generated batch script modifies the Windows Registry by adding an entry to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run, ensuring the trojan client32.exe automatically launches during system startup. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The malware’s payload delivery system demonstrates remarkable technical sophistication through its dynamic batch file generation capabilities. When a new victim is identified, header.php constructs a Windows batch script that orchestrates the complete infection process. The final payload establishes a backdoor connection to the command and control server at 5.252.178.123 on port 443, enabling remote access capabilities typical of advanced persistent threats.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 01 Jul 2025 14:40:18 +0000


Cyber News related to Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor - Cyber Security News

25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
1 week ago Cybersecuritynews.com
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor - Cyber Security News - A sophisticated multi-stage malware campaign has been discovered targeting WordPress websites, employing an intricate infection chain that delivers Windows trojans to unsuspecting visitors while maintaining complete invisibility to standard security ...
6 days ago Cybersecuritynews.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
2 months ago Cybersecuritynews.com
BianLian GOs for PowerShell After TeamCity Exploitation - In conjunction with GuidePoint's DFIR team, we responded to an incident that began with the exploitation of a TeamCity server which resulted in the deployment of a PowerShell implementation of BianLian's GO backdoor. The threat actor identified a ...
1 year ago Securityboulevard.com CVE-2024-27198 CVE-2023-42793 BianLian
New Stealthy NodeJS Backdoor Infects Users via CAPTCHA Verifications - This campaign represents a growing trend of threat actors exploiting seemingly legitimate security measures to distribute malicious code, targeting users who are accustomed to completing CAPTCHA challenges during their regular online activities. When ...
2 months ago Cybersecuritynews.com
New Sophisticated Linux-Backdoor Attacking OT Systems Exploiting 0-Day RCE - OrpaCrab exemplifies how attackers can compromise critical infrastructure without deep knowledge of industrial protocols, instead leveraging common networking standards to hide malicious traffic within legitimate communications. A sophisticated ...
3 months ago Cybersecuritynews.com
Researchers Unboxed FIN7's Stealthy Python-based Anubis Backdoor - The Python-based malware, dubbed “Anubis Backdoor,” represents an evolution in the group’s tactics, techniques, and procedures (TTPs) that have historically caused billions in damages globally. Cyber Security News is a Dedicated ...
3 months ago Cybersecuritynews.com FIN7
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Types of Malware and How To Prevent Them - Malware is one of the biggest security threats to any type of technological device, and each type of malware uses unique tactics for successful invasions. Even if you've downloaded a VPN for internet browsing, our in-depth guide discusses the 14 ...
1 year ago Pandasecurity.com
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
Blind Eagle Hackers Leveraging Google Drive, Dropbox & GitHub To Bypass Security Defenses - After infection, Remcos can capture user credentials by logging keystrokes and stealing stored passwords, modify and delete files to sabotage systems or encrypt data for ransom, establish persistence through scheduled tasks and registry modifications ...
3 months ago Cybersecuritynews.com CVE-2024-43451 APT-C-36
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
2 years ago Securityweek.com
February 2024's Most Wanted Malware: WordPress Websites Targeted by Fresh FakeUpdates Campaign - Our latest Global Threat Index for February 2024 saw researchers uncover a fresh FakeUpdates campaign compromising WordPress websites. These sites were infected using hacked wp-admin administrator accounts, with the malware adapting its tactics to ...
1 year ago Blog.checkpoint.com
New Chimera Malware That Outsmarts Antivirus, Firewalls, & Humans - This advanced malware first appeared in March 2025 when it infiltrated X Business, a small e-commerce company specializing in handmade home décor, through what appeared to be a routine software update to their inventory management system. This code ...
2 months ago Cybersecuritynews.com Chimera
TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections - The cybersecurity landscape faces a renewed threat as TA829, a sophisticated threat actor group, has emerged with enhanced tactics, techniques, and procedures (TTPs) alongside an upgraded version of the notorious RomCom backdoor. The actor’s ...
6 days ago Cybersecuritynews.com
CAPE from Cuckoo v1 - Malware Sandbox to Execute Malicious Files in An Isolated Environment - This approach enables CAPE to force malware samples to fully detonate even when they attempt to detect and evade analysis environments, providing security researchers with complete behavioral insights. Originally developed by Kevin O’Reilly at ...
3 months ago Cybersecuritynews.com
Gamaredon Hacker Group Using Weaponize LNK Files To Drop Remcos Backdoor on Windows - Cisco Talos researchers identified this campaign has been active since at least November 2024, with evidence suggesting Gamaredon is specifically targeting Ukrainian government organizations, critical infrastructure, and entities affiliated with ...
3 months ago Cybersecuritynews.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
DCRat Malware Via YouTube Attacking Users To Steal Login Credentials - Malware.News researchers identified that this campaign operates under a sophisticated Malware-as-a-Service (MaaS) model, with the cybercriminal group offering paid access to the backdoor, comprehensive technical support, and infrastructure setup for ...
3 months ago Cybersecuritynews.com
New FamousSparrow Malware Attacking Hotels & Engineering Companies to New Backdoor - Most notably, researchers found that one version of SparrowDoor is now modular, while another resembles what other security firms have called “CrowDoor” and attributed to the Earth Estries APT group, suggesting potential overlaps between ...
3 months ago Cybersecuritynews.com
PixPirate: The Brazilian financial malware you can't see, part one - The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan malware that heavily utilizes anti-research techniques. Within IBM Trusteer, we saw several different ...
1 year ago Securityintelligence.com
Chinese Hackers Using New BRICKSTORM Malware to Attack Windows & Linux Machines - Notably, unlike the Linux variant reported by Mandiant, the Windows samples lack direct command execution capabilities—a suspected deliberate choice to evade detection by security solutions that analyze parent-child process relationships. The ...
2 months ago Cybersecuritynews.com
When Satellites Go Dark - Persistent Cyber Assaults and The Growing Blind Spot - Cyber Security News - The latest malware strain, dubbed “OrbitShade,” first appeared on security researchers’ radars in early 2025, when several commercial satellite operators reported unexplained communication interruptions and command execution ...
2 months ago Cybersecuritynews.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)