{"id":24151,"date":"2025-06-03T20:31:45","date_gmt":"2025-06-03T16:31:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/dollyway-world-domination-infects-wordpress-websites\/24151\/"},"modified":"2025-06-03T20:31:45","modified_gmt":"2025-06-03T16:31:45","slug":"dollyway-world-domination-infects-wordpress-websites","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/dollyway-world-domination-infects-wordpress-websites\/24151\/","title":{"rendered":"DollyWay World Domination: attack on WordPress websites"},"content":{"rendered":"<p>Given that just under half of all websites in the world are powered by the WordPress content management system, it\u2019s no wonder cybercriminals are constantly looking for loopholes to exploit it. This past March, cybersecurity researchers at the hosting company GoDaddy <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malware-campaign-dollyway-breached-20-000-wordpress-sites\/\" target=\"_blank\" rel=\"nofollow noopener\">described a campaign<\/a> that began in 2016 and has since compromised more than 20\u00a0000 WordPress websites worldwide.<\/p>\n<p>The campaign has been dubbed \u201cDollyWay World Domination\u201d after a line of code (define (\u2018DOLLY_WAY\u2019, \u2018World Domination\u2019)) found in the malware used in this campaign. As part of DollyWay, threat actors inject malicious scripts with various capabilities onto websites. Their main goal is to redirect users from legitimate websites to third-party pages. As of February 2025, experts had recorded over 10\u00a0000 infected WordPress websites worldwide.<\/p>\n<p>To compromise websites, malicious actors exploit vulnerabilities in WordPress plugins and themes. They start by injecting a harmless-looking script that raises no red flags with security systems performing static HTML code analysis. The script operates as a stealthy infiltrator \u2014 quietly downloading more dangerous code used for profiling victims, communicating with command-and-control servers, and ultimately redirecting visitors to infected sites. You can read the <a href=\"https:\/\/www.godaddy.com\/resources\/news\/dollyway-world-domination\" target=\"_blank\" rel=\"nofollow noopener\">original research paper<\/a> for a detailed description of how these scripts work.<\/p>\n<h2>Monetizing the malicious campaign<\/h2>\n<p>Redirect-links generated by DollyWay include an affiliate identifier \u2014 much like referral programs that bloggers often use to promote products or services. These identifiers allow websites to track where users are coming from. Bloggers typically earn a commission on purchases made by visitors who arrive through referral links. The DollyWay World Domination Campaign is monetized in much the same way, using the VexTrio and LosPollos affiliate programs.<\/p>\n<p><a href=\"https:\/\/thehackernews.com\/2024\/01\/vextrio-uber-of-cybercrime-brokering.html\" target=\"_blank\" rel=\"nofollow noopener\">VexTrio has been called the \u201cUber of cybercrime\u201d<\/a>. Reportedly active since at least 2017, this service primarily acts as a broker for scam content, spyware, malware, pornography, and so on. It\u2019s VexTrio that redirects the traffic from DollyWay to scam sites. As noted above, the malware profiles its victims. Based on these profiles, users are then funneled to various types of websites, such as fake dating sites, crypto scams, or gambling pages.<\/p>\n<p><a href=\"https:\/\/www.lospollos.com\/en\/\" target=\"_blank\" rel=\"nofollow noopener\">LosPollos<\/a> apparently specializes in selling traffic to legitimate services. Whenever DollyWay redirects traffic to a site promoted by LosPollos, the redirects always include the same LosPollos affiliate account identifier. DollyWay\u2019s partnership with LosPollos explains why, in some cases, redirects from infected sites lead users not to malicious pages, but to legitimate app listings on Google Play such as Tinder or TikTok.<\/p>\n<h2>How DollyWay conceals itself on websites it has infected<\/h2>\n<p>Cybercriminals exercise great care to keep their malware from being detected and removed. For starters, the malicious code is injected into every active plugin. Removing it is no walk in the park, as DollyWay employs an advanced re-infection mechanism that triggers every time a page on the compromised site is accessed. If the malicious code isn\u2019t removed from all active plugins and snippets, loading any page on the site will result in re-infection.<\/p>\n<p>Detecting DollyWay may prove no simple task either \u2014 the malware is adept at hiding its presence on an infected site. To maintain access to the compromised site, the attackers create their own account with admin privileges, and DollyWay hides this account from the WordPress dashboard.<\/p>\n<p>In case their accounts are discovered, the attackers also hijack the credentials of legitimate administrators. To do this, DollyWay monitors everything entered into the site\u2019s admin login form and saves the data to a hidden file.<\/p>\n<p>The attackers also take steps to ensure their assets remain operational. Researchers found evidence of a script apparently used by the attackers to maintain infected sites. Specifically, it can update WordPress, install and update required components, and initiate the injection of malicious code.<\/p>\n<p>Experts also discovered a web shell that the attackers use, among other things, to update compromised sites and keep away rival malware. This goes to show that the attackers are keen to prevent other malware from hijacking traffic or setting off any security alarms that might alert the site owner.<\/p>\n<p>The experts believe that the maintenance script and web shell aren\u2019t deployed on every site infected by DollyWay. Maintaining such infrastructure across all 10\u00a0000 sites would be prohibitively resource-intensive. Chances are, the attackers only deploy these scripts on their most valuable assets.<\/p>\n<h2>Protecting your corporate website<\/h2>\n<p>The sheer scale and longevity of the DollyWay World Domination campaign once again underscore the need for regular security audits of company websites. When it comes to WordPress sites, plugins and themes deserve particular attention \u2014 they\u2019ve repeatedly proven to be the most vulnerable parts of the platform\u2019s infrastructure.<\/p>\n<p>If you suspect your company\u2019s website has fallen victim to DollyWay, researchers recommend keeping a close eye on file creation and deletion events. Such activity can be an indicator of compromise, as some versions of DollyWay v3 perform file operations every time a page is loaded.<\/p>\n<p>Here is what you need to do if you come across signs of compromise.<\/p>\n<ul>\n<li>Temporarily take the affected site offline, redirecting all traffic to a static page. Or, at the very least, deactivate all plugins while you\u2019re removing the malware.<\/li>\n<li>Remove any suspicious plugins \u2014 but keep in mind that DollyWay knows how to hide them from the WordPress dashboard.<\/li>\n<li>Delete any unrecognized administrator accounts \u2014 again, be aware that DollyWay can hide these too.<\/li>\n<li>Change the passwords for all WordPress users, starting with anyone who has admin privileges.<\/li>\n<li>Enable two-factor authentication for WordPress sign-in.<\/li>\n<li>If the internal infosec team\u2019s resources are insufficient, seek help from third-party <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/incident-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">incident response specialists<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"18950\">\n","protected":false},"excerpt":{"rendered":"<p>Since 2016, a threat actor has been exploiting insecure plugins and themes to infect WordPress websites and redirect traffic to malicious websites. <\/p>\n","protected":false},"author":2726,"featured_media":24152,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[1457,2078,417,1022,521,268,399,304],"class_list":{"0":"post-24151","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-business","11":"tag-cms","12":"tag-plugins","13":"tag-risks","14":"tag-threats","15":"tag-vulnerabilities","16":"tag-websites","17":"tag-wordpress"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dollyway-world-domination-infects-wordpress-websites\/24151\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/dollyway-world-domination-infects-wordpress-websites\/28926\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dollyway-world-domination-infects-wordpress-websites\/29029\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dollyway-world-domination-infects-wordpress-websites\/28213\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dollyway-world-domination-infects-wordpress-websites\/31014\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dollyway-world-domination-infects-wordpress-websites\/29728\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dollyway-world-domination-infects-wordpress-websites\/39734\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dollyway-world-domination-infects-wordpress-websites\/13450\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dollyway-world-domination-infects-wordpress-websites\/53506\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dollyway-world-domination-infects-wordpress-websites\/22854\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dollyway-world-domination-infects-wordpress-websites\/23907\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dollyway-world-domination-infects-wordpress-websites\/32289\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/dollyway-world-domination-infects-wordpress-websites\/29207\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dollyway-world-domination-infects-wordpress-websites\/34965\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dollyway-world-domination-infects-wordpress-websites\/34598\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/wordpress\/","name":"wordpress"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24151"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24151\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24152"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}