Saturday, April 5, 2025
HomecryptocurrencyThreat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

Published on

SIEM as a Service

Follow Us on Google News

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to redirect visitors to Chinese-language gambling platforms.

The campaign, first detected in February 2025 with 35,000 infected sites, has since expanded significantly, leveraging obfuscated scripts and iframe injections to hijack browsers.

Chinese Gambling Platforms
injected pages

Attackers use domains like zuizhongyj[.]com to host payloads, which display full-screen overlays mimicking legitimate betting sites such as Bet365.

Technical Tactics

The threat actors employ HTML entity encoding and hexadecimal obfuscation to hide malicious scripts, such as injecting <script> tags disguised as benign code.

Decoded scripts reveal redirects to gambling domains like 551007t[.]cc and W88in[.]com, targeting Chinese-speaking users in China, Hong Kong, and the U.S.

The payloads enforce mobile-friendly viewports and use keyword detection (e.g., “bet365” or “太阳城”) to tailor redirects.

Chinese Gambling Platforms
redirect URLs

Broader Implications

According to the Report, this campaign mirrors other malicious operations, including GoDaddy’s disclosure of the DollyWay World Domination malware, which compromised 20,000 sites since 2016.

Experts warn of rising client-side attacks, urging website owners to audit scripts, monitor for unauthorized iframes, and implement strict Content Security Policies (CSPs).

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...