- Hackers are spreading malware via compromised WordPress sites and BNB smart contracts.
- Storing code in contracts lets malware be updated evasively on the blockchain.
- As Web3 expands, so can possibilities for cybercrime if defenses don’t adapt.
Cybercriminals have developed a novel attack vector exploiting Binance Smart Chain (BSC) smart contracts to covertly distribute malware to unsuspecting internet users.
According to an Oct. 15 report by Guardio Labs, hackers are compromising WordPress websites and injecting code that retrieves malware payloads hidden in BSC contracts. The decentralized nature of blockchain allows the payloads to be hosted anonymously.
By updating the contract transactions, the attackers can modify the malicious code and evasion techniques on the fly. The latest infections involve fake browser update prompts tricking victims into downloading malware.
Once deployed, the infected contracts operate autonomously beyond Binance’s control. The exchange relies on its developer community to identify and flag any malicious code.
With WordPress powering over 43% of all websites, site owners must vigilantly follow security best practices, researchers emphasized. Guardio concluded that as blockchain expands, so too will the possibilities for unchecked cybercrime campaigns.
The Troublesome Trifecta: WordPress Sites, Smart Contracts, and Evolving Threats
The convergence of three key factors has enabled this cunning attack: the popularity of WordPress sites, the autonomy of smart contracts, and the mutable nature of malware chains. Together, they allow threat actors to infiltrate at scale while avoiding detection.
Experts urge greater collaboration across the blockchain ecosystem to adapt defenses against such emerging Web3-enabled threats.