Thursday, March 20, 2025
Homecyber securityMassive "DollyWay" Malware Attack Compromises 20,000+ WordPress Sites Worldwide

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

Published on

SIEM as a Service

Follow Us on Google News

A significant malware operation, dubbed “DollyWay,” has been uncovered by GoDaddy Security researchers, revealing a sophisticated campaign that has compromised over 20,000 WordPress sites globally.

This operation, which began in 2016, leverages a distributed network of compromised WordPress sites as Traffic Direction System (TDS) and Command and Control (C2) nodes.

The malware’s latest iteration, DollyWay v3, employs advanced techniques such as cryptographically signed data transfers, heterogeneous injection methods, and automatic reinfection mechanisms to maintain control over infected sites.

Sophisticated Malware Techniques

DollyWay v3 primarily targets visitors of infected WordPress sites by injecting redirect scripts that funnel traffic through VexTrio, a major cybercriminal affiliate network.

Malware Attack
Example of VexTrio/LosPollos scam landing page served by DollyWay redirects. 

The malware uses a four-stage injection chain to evade detection.

Initially, it appends a dynamically generated script to the site’s main URL, which then loads subsequent scripts that collect referrer information and eventually redirect users to scam pages.

The malware also removes competing malware and updates WordPress to ensure its persistence.

The reinfection mechanism is particularly sophisticated, involving the injection of malicious PHP code into active plugins and WPCode snippets.

According to the Report, this code is re-obfuscated regularly to evade detection, making removal challenging.

Additionally, the malware creates malicious admin users with random hexadecimal usernames and email addresses, further complicating cleanup efforts.

Command and Control Infrastructure

DollyWay maintains its infrastructure through encoded WordPress options, storing settings in a sophisticated format.

The malware updates its node list daily using cryptographic signatures to verify data integrity.

This ensures that only authorized updates are applied, protecting the malware’s control over compromised sites.

The use of compromised WordPress sites as C2/TDS nodes allows the malware to adapt and evolve, making it a formidable threat in the cybersecurity landscape.

The ongoing evolution of DollyWay highlights the increasing sophistication of malware campaigns and the need for robust security measures to protect against such threats.

As the campaign continues to adapt, it remains a significant concern for WordPress site owners and cybersecurity professionals alike.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to...

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane,...

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to...

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane,...