What is the Real Relationship between WordPress Hackers and Malicious Adtech?

Medium
Published: Fri Jun 13 2025 (06/13/2025, 07:59:41 UTC)
Source: AlienVault OTX General

Description

An investigation into VexTrio, a malicious traffic distribution system (TDS), revealed surprising connections between WordPress hackers and adtech companies. When VexTrio's operations were disrupted, multiple malware actors migrated to a new TDS that was discovered to be related to VexTrio. Several commercial TDSs were found to share software elements with VexTrio and benefit from its relationship with website malware actors. The investigation uncovered a complex network of adtech firms, including Partners House, BroPush, and RichAds, that use similar technologies and tactics to distribute malicious content. These firms have information about the identities of malware actors, which could potentially lead to their disruption.

AI-Powered Analysis

AILast updated: 06/13/2025, 08:34:30 UTC

Technical Analysis

The threat revolves around VexTrio, a malicious Traffic Distribution System (TDS) that operates by redirecting web traffic to deliver malware and other malicious payloads. VexTrio has been linked to a network of WordPress hackers who compromise websites to inject malicious code, which then funnels visitors through the TDS infrastructure. When VexTrio's operations were disrupted, malware actors migrated to a successor TDS sharing code and operational tactics with VexTrio, indicating a resilient and adaptive threat ecosystem. The investigation uncovered that several commercial adtech firms, including Partners House, BroPush, and RichAds, share software components and methodologies with VexTrio, blurring the lines between legitimate advertising technology and malicious activity. These adtech companies leverage push notifications, DNS manipulation, and affiliate networks to distribute malicious content, exploiting the trust and reach of advertising platforms. The relationship between these adtech firms and malware actors is complex, with the adtech companies possessing detailed information about the identities of malware operators, potentially enabling law enforcement or security researchers to disrupt these networks. The threat employs multiple tactics and techniques as categorized by MITRE ATT&CK, including command and control over web protocols (T1071), exploitation of public-facing applications (T1190), use of affiliate networks (T1608), and social engineering via push notifications (T1204). The lack of known exploits in the wild suggests that the threat is more focused on distribution and persistence rather than zero-day exploitation. Overall, this threat represents a sophisticated convergence of cybercrime and adtech ecosystems, leveraging compromised WordPress sites and advertising infrastructure to propagate malware at scale.

Potential Impact

European organizations, particularly those operating WordPress-based websites or relying heavily on digital advertising and adtech services, face significant risks from this threat. Compromised WordPress sites can lead to unauthorized access, data breaches, and reputational damage. The integration of malicious TDS within adtech platforms means that even organizations with secure websites may inadvertently serve malicious content to their users, undermining user trust and potentially causing widespread malware infections. The use of push notifications and DNS manipulation can facilitate phishing, drive-by downloads, and persistent malware infections, impacting confidentiality, integrity, and availability of systems. For sectors such as e-commerce, media, and online services, this could result in financial losses, regulatory penalties under GDPR for data breaches, and erosion of customer confidence. Additionally, the involvement of affiliate networks and commercial adtech firms complicates attribution and mitigation, potentially prolonging exposure. The threat also poses risks to critical infrastructure and government websites if compromised, given the strategic importance of these targets in Europe. The medium severity rating reflects the threat's potential for broad impact through indirect infection vectors and the difficulty in fully eradicating the malicious infrastructure due to its ties with legitimate adtech entities.

Mitigation Recommendations

1. Harden WordPress installations by enforcing strict update policies, using security plugins that detect and block malicious code injections, and conducting regular security audits to identify and remediate compromises promptly. 2. Monitor and restrict the use of third-party adtech services, especially those linked to known malicious TDS operations; implement allowlists for trusted ad networks and block suspicious domains and IPs associated with VexTrio and related entities. 3. Deploy advanced DNS filtering solutions to detect and block malicious DNS queries related to TDS redirections. 4. Implement Content Security Policy (CSP) headers and Subresource Integrity (SRI) to reduce the risk of malicious script execution from compromised adtech sources. 5. Educate users and administrators about the risks of push notification abuse and configure browsers and endpoints to limit or block unsolicited push notifications from untrusted sources. 6. Collaborate with threat intelligence providers to receive timely updates on indicators of compromise related to VexTrio and affiliated adtech firms. 7. Conduct network traffic analysis to identify unusual redirection patterns or connections to known malicious TDS infrastructure. 8. Engage with legal and regulatory bodies to address the complicity of commercial adtech firms in malicious activities and promote transparency and accountability in the adtech ecosystem.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blogs.infoblox.com/threat-intelligence/vexing-and-vicious-the-eerie-relationship-between-wordpress-hackers-and-an-adtech-cabal/"]
Adversary
VexTrio
Pulse Id
684bda6d032b4c4aeb5ec33c
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip185.234.216.54
ip185.11.61.37
ip185.161.248.253
ip46.30.45.27

Hash

ValueDescriptionCopy
hash9eb2bcdc89976429bc64127056a4a9d5d3a2b57a

Url

ValueDescriptionCopy
urlhttp://pushtorm.net/System/AddSubscriber
urlhttp://somenth.bilitere.shop/?utm_medium=
urlhttps://help.scaleo.io/article/414-los-pollos-affiliate-network

Domain

ValueDescriptionCopy
domainairlogs.net
domainbetelgeuserigel.com
domaincdn-routing.com
domaincdsecurecloud-dt.com
domaincloud-stats.com
domaincndatalos.com
domainco34.space
domaindata-cheklo.world
domaindata-infox.com
domaindeidrerealestate.co
domaindns-routing.com
domaininfosystemsllc.com
domainknowableuniverse.co
domainlogs-web.com
domainlookup-domain.com
domainmsgdetox.com
domainnews-abcd.cc
domainnotification-centr.com
domainoktrkme.com
domainospeau.com
domainpacocha.shop
domainparticipates.cfd
domainphenotypebest.com
domainprefez.shop
domainpurinagun.ru
domainritardalarmser.gq
domainrobotverifier.com
domainrpn-news3.club
domainscoretopprizes.top
domainsiteforyou3d.com
domainsweetrnd.net
domainvipbonusgain.top
domainweb-hosts.io
domain0.blueskyactivecontrol.com
domain0.mo10.biz
domain0.robotverifier.com
domain0.se11.biz
domain0.strongblackspaces.com
domain0.to6s.biz
domain01afa41bf2.news-xceyuna.live
domain01be885d26.hotbwixife.today
domain0605ee9ae7.hotbfocuhe.cc
domain06254a045e.news-xkijeki.store
domain0cc79f7666.news-xzomigu.cc
domain19a1.brpconnecta.digital
domain1azo7.iqfmvj.com
domain209c.brpteamwork.cc
domain2765516796.news-xdujuwe.xyz
domain2rt.xcumpw.com
domain2zhyl.iqfmvj.com
domain3ic.ymehtq.com
domain43ff.rpstreamfx.xyz
domain5435.rpknowledge.xyz
domain6.enlala.com
domain6.lands.ninja
domain702942e07c.hotbkebani.cc
domain7r6.fmqrsj.com
domain9c3e1.rpdiscover.xyz
domainb9ab1.rpbuildit.xyz
domainc62a.rpbuildhub.xyz
domaincdn.jmp-assets.com
domaind3l.wstbaw.com
domaindate.oktrkme.com
domainf68wy7o9ezwwtqc1do.oscarey.my.id
domainfe12.brpdataboxx.today
domaingzeao.cavernexplorer.com
domaingzeao.check-tl-ver-116-3.com
domaingzeao.check-tl-ver-154-2.com
domainhelp.scaleo.io
domaini8b.wstbaw.com
domainmnz.oktrkme.com
domainmvgde.mountbliss.top
domainmvgde.runesmith.top
domainmvgde.runicartisan.top
domainmvgde.sec-tl-129-b.buzz
domainmvgde.sec-tl-129-d.buzz
domainmvgde.stonecoremason.com

Threat ID: 684bdf0ca8c9212743803712

Added to database: 6/13/2025, 8:19:24 AM

Last enriched: 6/13/2025, 8:34:30 AM

Last updated: 6/16/2025, 5:12:27 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats