CyberCX Hack Report: Insights from a year of offensive security testing →

DarkEngine: CyberCX Uncovers Highly Orchestrated WordPress Phishing Campaign

Threat Advisory

Published by Digital Forensics and Incident Response (DFIR) and Cyber Intelligence on June 3 2025

Primary authors: Liam Wilkinson, DFIR and Thomas McIntyre, Cyber Intelligence

 

CyberCX has uncovered a highly orchestrated phishing campaign designed to harvest credentials from WP Engine users to compromise managed WordPress websites at scale. The campaign uses search engine optimisation (SEO) poisoning to target WP Engine, a popular web hosting platform used by businesses to manage multiple WordPress websites from a single portal.

The campaign, which CyberCX has dubbed DarkEngine, infects WordPress websites with a backdoor plugin and malicious scripts leading to the delivery of malware by embedding fake CAPTCHA prompts associated with the Yet Another NodeJS Backdoor (YaNB)[1], KongTuke, LandUpdate808 (also referred to as UNC5518), and TAG-1242[2] activity clusters.

CyberCX has identified at least 2,353 unique websites potentially compromised by this threat actor, 82 of which belong to Australian and New Zealand organisations, and at least 28 compromised WP Engine credentials captured (this number is likely to be significantly higher). CyberCX Intelligence has proactively notified these organisations as part of our efforts to secure our communities.

CyberCX notes that this campaign is ongoing and that the threat actor may change indicators mentioned in this report based on their known techniques and exposure.

 


 

Key Points

 


 

You can download the full DarkEngine Report below

 

Download

 


 

[1] https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/yet-another-nodejs-backdoor-yanb-a-modern-challenge/
[2] https://www.recordedfuture.com/research/tag-124-multi-layered-tds-infrastructure-extensive-user-base
[3] https://www.logpoint.com/en/blog/emerging-threats/clickfix-another-deceptive-social-engineering-technique
[4] This figure was sourced from data obtained from threat actor infrastructure. Due to the historic nature of some of this data, CyberCX is unable to guarantee that all identified websites were compromised.
[5] https://www.recordedfuture.com/research/tag-124-multi-layered-tds-infrastructure-extensive-user-bas

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.