Skip to main content

Malicious JavaScript Injects Fullscreen Iframe On a WordPress Website

Medium
Published: Thu Aug 14 2025 (08/14/2025, 08:07:05 UTC)
Source: AlienVault OTX General

Description

A JavaScript-based malware campaign has been discovered affecting compromised WordPress websites. The malware injects a fullscreen iframe that loads content from suspicious external domains, aiming to force users to view unsolicited content for ad fraud, traffic generation, or social engineering. The infection was found embedded in the WordPress wp_options database table, exploiting the WPCode plugin. The malicious script uses advanced evasion techniques like anti-debugging, function hijacking, and localStorage abuse. It selectively targets Windows users on specific browsers, displaying a fake Cloudflare CAPTCHA page that prompts users to run a suspicious PowerShell command. This attack not only intrudes on user experience but also poses significant security risks, potentially leading to system compromise and damage to website reputation.

AI-Powered Analysis

AILast updated: 08/14/2025, 11:19:58 UTC

Technical Analysis

This threat involves a JavaScript-based malware campaign targeting compromised WordPress websites, specifically exploiting the WPCode plugin to embed malicious code within the wp_options database table. The malware injects a fullscreen iframe overlay on affected sites, loading content from a set of suspicious external domains. The primary goals of this campaign appear to be ad fraud, traffic manipulation, and social engineering. The injected script employs advanced evasion techniques such as anti-debugging, function hijacking, and abuse of localStorage to avoid detection and analysis. It selectively targets Windows users browsing with specific browsers by displaying a fake Cloudflare CAPTCHA page. This fake CAPTCHA prompts users to execute a suspicious PowerShell command, which could lead to further system compromise. The attack thus not only degrades user experience by forcing unsolicited content but also poses significant security risks including potential remote code execution on victim machines and reputational damage to the compromised websites. The campaign is characterized by its stealth and selective targeting, making detection and mitigation more challenging. Indicators of compromise include a set of malicious domains and an IP address (180.178.189.7) hosting the fake CAPTCHA page. Although no known exploits in the wild or CVE identifiers are reported, the complexity and potential impact of this malware warrant serious attention.

Potential Impact

For European organizations, this threat could have multiple adverse effects. Organizations running WordPress sites with the WPCode plugin are at risk of website compromise, leading to unauthorized content injection that damages brand reputation and user trust. The forced display of malicious iframes can degrade user experience and drive traffic to fraudulent or malicious domains, potentially exposing visitors to further malware or phishing attacks. The social engineering component, involving a fake CAPTCHA and PowerShell command prompt, risks local system compromise of end users, which could lead to data breaches, lateral movement within networks, or ransomware deployment. Given the widespread use of WordPress across European businesses, including SMEs and large enterprises, the threat could disrupt online services, reduce customer confidence, and incur remediation costs. Additionally, GDPR and other data protection regulations in Europe impose strict requirements on breach notification and data security, increasing the legal and financial consequences of such infections. The selective targeting of Windows users on specific browsers aligns with common enterprise environments in Europe, potentially amplifying the impact.

Mitigation Recommendations

1. Immediate audit and cleaning of WordPress installations, focusing on the wp_options table and the WPCode plugin for unauthorized code injections. 2. Update or remove the WPCode plugin if vulnerabilities or compromises are suspected, and ensure all WordPress components are kept up to date with security patches. 3. Implement strict access controls and monitoring on WordPress admin interfaces to detect unauthorized changes. 4. Deploy web application firewalls (WAF) with rules to detect and block iframe injection and suspicious JavaScript behaviors. 5. Monitor network traffic for connections to the identified malicious domains and IP addresses, blocking them at DNS or firewall levels. 6. Educate users about the risks of executing unsolicited PowerShell commands and implement endpoint protection solutions that can detect and prevent suspicious script execution. 7. Conduct regular security scans and integrity checks of website files and databases to detect early signs of compromise. 8. Use Content Security Policy (CSP) headers to restrict iframe sources and script execution on WordPress sites. 9. Employ browser security features and endpoint detection to mitigate social engineering attempts. 10. Establish incident response plans tailored to web compromises involving JavaScript injection and social engineering payloads.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.sucuri.net/2025/08/malicious-javascript-injects-fullscreen-iframe-on-a-wordpress-website.html"]
Adversary
null
Pulse Id
689d9929e2ae3c7ac177ec6a
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip180.178.189.7

Url

ValueDescriptionCopy
urlhttp://180.178.189.7/mycaptcha.html

Domain

ValueDescriptionCopy
domainwallpaper-engine.pro
domainwanderclean.com
domainampunshifu.org
domaincdnstat.net
domainadoodlz.com
domainsecretdinosaurcult.com
domainweathersnoop.com

Threat ID: 689dc258ad5a09ad0059fea1

Added to database: 8/14/2025, 11:02:48 AM

Last enriched: 8/14/2025, 11:19:58 AM

Last updated: 8/15/2025, 4:53:54 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats