This content is viewable by Everyone

Dec 2023: WordPress-Themed Lures Install Malicious Plugin

Threat Alert WordPress-Themed Lures Install Malicious Plugin 

  • Cybercriminals have launched a series of phishing attacks abusing the WordPress brand. 
  • The phishing lures used in these attacks spoof the WordPress security team’s email and warn of a critical flaw in the WordPress platform that needs to be addressed. 
  • The email directs recipients to follow a shortened Bitly link to download a “Security Update Plugin.” 
  • These lures use believable WordPress branding. However, throughout the email the attackers misspell WordPress, instead typing “Wordpress.” 

Key Actions (at Work and at Home) 

  • Go beyond surface clues. Familiar logos, branding, and names are not automatic indicators that an email or website is safe. Cybercriminals often imitate well-known organizations.    
  • Beware of shortened URLs. Remember, shortened URLs function as a mask for another link. This makes it difficult to be certain of the true destination for where these links lead.   
  • Remain alert to phishing indicators. Emails purporting to be from a brand yet styling or spelling the brand’s name wrong should automatically be treated as suspicious.  
  • Report ANY suspicious emails using the Phish Alarm button. Remember: Our organization occasionally sends phishing simulations.