Tuesday, May 6, 2025
HomeComputer SecurityHackers Using Wordpress and Joomla Sites to Distribute Shade Ransomware

Hackers Using WordPress and Joomla Sites to Distribute Shade Ransomware

Published on

SIEM as a Service

Follow Us on Google News

CMS based sites such as WordPress and Joomla are the popular targets for cybercriminals, they hijack those sites and inject malicious contents.

ThreatLabZ researchers detected a campaign that targets WordPress and Joomla sites to distribute Shade/Troldesh ransomware, backdoors, redirectors, and a variety of phishing pages.

Hackers use to hijack several hundreds of CMS sites and inject the Troldesh ransomware and phishing pages. All the compromised websites using WordPress versions between 4.8.9 to 5.1.1 and they SSL issued through Automatic Certificate Management Environment such as Let’s Encrypt, Cpanel and others.

- Advertisement - Google News

According to zscaler, among the compromised sites, 13.6 percent contains Shade ransomware, 27.6 percent contains phishing pages and rest of the sites contains coinminers, adware, and malicious redirectors.

Attackers favoring the .well-know hidden directory for storing and distributing ransomware. The hidden .well-know directory is created by the site administratory to verify the ownership of the domain.

Shade Ransomware Infection

Shade ransomware infected sites contain HTML, ZIP, and EXE (.jpg) files, the HTML files are to redirect the users in downloading the zip file, the zip file contains highly obfuscated that downloads payload to Temp location.

The downloaded payload is the Shade/Troldesh ransomware that encrypts all the users file with AES-256 and appends a filename(.ID_of_infected_machine.crypted000007).

“It drops README1.txt to README10.txt on the desktop and changes the wallpaper as shown below”, reads ZScaller blog post.

Phishing pages

Phishing pages also stored in the hidden directories to hide them from website administrators and to increase in the life of the phishing page in the compromised site.

The phishing pages are related to Office 365, Microsoft, DHL, Dropbox, Bank of America, Yahoo, Gmail, and others.

Last week researches discovered a Stored XSS Vulnerability in social sharing plug-in called “Social Warfare” which allows attackers to take over the vulnerable WordPress websites.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researcher Exploits Regex Filter Flaw ...

Target application included a username field restricted by a frontend regex filter (/^{1,20}$/), designed...

TikTok Hit with €530 Million Fine Over Data Transfers to China

Irish Data Protection Commission (DPC) has imposed a landmark €530 million fine on TikTok...

xAI API Key Leak Exposes Proprietary Language Models on GitHub

Employee at Elon Musk’s artificial intelligence firm xAI inadvertently exposed a private API key...

Firefox’s Future Uncertain Without Google Search Deal, Insider Warns

Mozilla's Chief Financial Officer testified that Firefox could face extinction if Justice Department proposals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researcher Exploits Regex Filter Flaw ...

Target application included a username field restricted by a frontend regex filter (/^{1,20}$/), designed...

TikTok Hit with €530 Million Fine Over Data Transfers to China

Irish Data Protection Commission (DPC) has imposed a landmark €530 million fine on TikTok...

xAI API Key Leak Exposes Proprietary Language Models on GitHub

Employee at Elon Musk’s artificial intelligence firm xAI inadvertently exposed a private API key...