This content is viewable by Everyone
Dec 2023: WordPress-Themed Lures Install Malicious Plugin
Threat Alert WordPress-Themed Lures Install Malicious Plugin
- Cybercriminals have launched a series of phishing attacks abusing the WordPress brand.
- The phishing lures used in these attacks spoof the WordPress security team’s email and warn of a critical flaw in the WordPress platform that needs to be addressed.
- The email directs recipients to follow a shortened Bitly link to download a “Security Update Plugin.”
- These lures use believable WordPress branding. However, throughout the email the attackers misspell WordPress, instead typing “Wordpress.”
Key Actions (at Work and at Home)
- Go beyond surface clues. Familiar logos, branding, and names are not automatic indicators that an email or website is safe. Cybercriminals often imitate well-known organizations.
- Beware of shortened URLs. Remember, shortened URLs function as a mask for another link. This makes it difficult to be certain of the true destination for where these links lead.
- Remain alert to phishing indicators. Emails purporting to be from a brand yet styling or spelling the brand’s name wrong should automatically be treated as suspicious.
- Report ANY suspicious emails using the Phish Alarm button. Remember: Our organization occasionally sends phishing simulations.