Toggle light / dark theme

A new malware campaign has compromised more than 5,000 WordPress sites to create admin accounts, install a malicious plugin, and steal data.

Researchers at webscript security company c/side discovered during an incident response engagement for one of their clients that the malicious activity uses the wp3[.]xyz domain to exfiltrate data but have yet to determine the initial infection vector.

After compromising a target, a malicious script loaded from the wp3[.]xyz domain creates the rogue admin account wpx_admin with credentials available in the code.

The rapid evolution of artificial intelligence is transforming cybersecurity, offering unprecedented opportunities to defend against increasingly complex and automated threats. AI is no longer a support tool—it’s emerging as a central pillar of modern security strategies. From detecting anomalies and automating threat responses to augmenting security teams, AI is enabling defenders to act faster, scale their operations, and outpace attackers. However, as the technology advances, significant challenges remain, from adversarial AI to the cultural inertia of legacy systems.

Tomer Weingarten, CEO of SentinelOne, and Richard Stiennon, research analyst with IT-Harvest and author of Security Yearbook 2024, both highlight the potential—and limitations—of AI in cybersecurity. “It’s very early days for AI in security,” says Stiennon. “I have found 84 startups with various AI agents or which hope to deploy guardrails to protect companies from mishandling of data by users of AI. It’s way too early to say that any of them are having an impact on the ecosystem. That said, the future is clear. AI will be part of every cyber defense position.”

Weingarten echoes this sentiment, noting that AI’s role is rapidly expanding but far from mature. “AI is no longer just about supporting cybersecurity—it’s fundamentally changing how we secure systems, anticipate threats, and automate responses,” he explains.

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks.

The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

Exploiting an arsenal of over 20 known security vulnerabilities and weak Telnet credentials for initial access, the malware is known to have been active since February 2024. The botnet has been dubbed “gayfemboy” in reference to the offensive term present in the source code.

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns.

Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.

While there are safeguards such as DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting and Conformance (DMARC), and Sender Policy Framework (SPF) that can be used to prevent spammers from spoofing well-known domains, such measures have increasingly led them to leverage old, neglected domains in their operations.

Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework.

The new variant of EAGERBEE (aka Thumtais) comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution.

“The key plugins can be categorized in terms of their functionality into the following groups: Plugin Orchestrator, File System Manipulation, Remote Access Manager, Process Exploration, Network Connection Listing, and Service Management,” Kaspersky researchers Saurabh Sharma and Vasily Berdnikov said in an analysis.