A sophisticated new malware campaign targeting WordPress sites has security experts on high alert after a recent incident exposed a layered, hard-to-detect infection chain.
Unlike typical defacements or spam campaigns, this attack uses stealthy PHP droppers, obfuscated code, IP tracking, and batch script generation to deliver a Windows-based Remote Access Trojan (RAT) known as client32.exe.
The initial compromise vector remains unclear, but evidence suggests that cybercriminals injected custom PHP malware into two critical files, header.php and man.php, after gaining access likely through stolen credentials or vulnerable plugins.
The infection is designed to remain invisible to site owners and visitors, showing no redirects or evident tampering.
At the heart of the attack header.php lies the central controller. It silently profiles each site visitor, enforcing an IP blacklist by logging addresses in count.txt a simple but effective way to avoid repeated infections and evade analysis.
Only visitors making fresh POST requests from new IPs are served a hidden payload.
When triggered, header.php it dynamically generates a heavily obfuscated Windows batch script (update.bat). This script, forcibly downloaded to the victim’s machine, automates several attack steps:
psps.zip) from a remote server.client32.exeThe final Trojan payload.HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run.The companion man.php The script provides attackers with a crude web interface to monitor and reset the IP log (count.txt), maintaining ongoing control.
Once deployed, client32.exe it connects to a command-and-control server at 5.252.178.123:443, where it can receive further malicious commands.
Security analysts warn that such RATs can exfiltrate data, install additional malware, and maintain deep persistence.
Site owners are urged to:
End-users should be cautious of unfamiliar downloads, keep their security tools up to date, and regularly apply system patches.
This campaign highlights the growing use of sophisticated, fileless infection chains that leverage PowerShell and batch scripts, a trend that calls for vigilance from both administrators and everyday web users.
If you suspect your WordPress site has been targeted, immediate forensic investigation is strongly advised.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…