WordPress

Winsage
April 24, 2025
WampServer is a web development environment designed for Windows users, integrating MySQL, Apache, and PHP into a single package for local web application development. It simplifies the setup process, allowing novice developers to create functional development servers without affecting live websites. WampServer operates independently of an internet connection and provides a user-friendly control panel for managing server components. It supports both free-form PHP coding and content management systems like WordPress, Joomla, and Drupal. WampServer is free to use and compatible with Windows 7, 8, 10, and 11, but not with macOS or Linux. Alternatives to WampServer include MAMP, XAMPP, and Apache HTTP Server, each offering different features and compatibility.
AppWizard
March 28, 2025
Recent research from cybersecurity firm Sophos has identified the use of PJobRAT malware targeting users in Taiwan through instant messaging applications SangaalLite and CChat, which mimic legitimate platforms. These malicious apps were available for download on various WordPress sites, now taken offline. PJobRAT, an Android remote access trojan first identified in 2019, has been used to steal SMS messages, contacts, device information, documents, and media files. The recent cyber-espionage initiative lasted nearly two years, affecting a limited number of users, indicating a targeted approach by the attackers. The latest version of PJobRAT lacks the ability to steal WhatsApp messages but allows attackers greater control over infected devices. The distribution method for these apps remains unclear, but previous campaigns involved third-party app stores and phishing pages. Upon installation, the apps request extensive permissions and provide basic chat functionalities. Sophos researchers note that threat actors often refine their strategies after campaigns, suggesting ongoing risks.
AppWizard
March 28, 2025
PJobRAT is an Android Remote Access Trojan that re-emerged in 2023, targeting users in Taiwan. Initially known for targeting Indian military personnel, it now disguises itself as benign apps like ‘SangaalLite’ and ‘CChat’, distributed via defunct WordPress sites operational from January 2023 to October 2024, with domain registrations dating back to April 2022. The malware is spread through counterfeit applications resembling legitimate messaging services, prompting users to grant extensive permissions. Enhanced capabilities allow it to execute shell commands, access data from any app, root devices, and communicate with command-and-control servers via Firebase Cloud Messaging and HTTP. The campaign appears to have concluded, highlighting the evolving tactics of threat actors. Users are advised against installing apps from untrusted sources and to use mobile threat detection software.
AppWizard
March 28, 2025
PJobRAT is an Android Remote Access Trojan (RAT) that re-emerged in 2023 with improved capabilities and a refined targeting strategy, previously known for attacking Indian military personnel in 2021. It is now targeting users in Taiwan through social engineering tactics, disguising itself as legitimate dating and messaging apps. The malware is distributed via compromised WordPress sites hosting fake applications like “SaangalLite” and “CChat.” The infection footprint is small, indicating highly targeted attacks rather than widespread campaigns. PJobRAT retains its core functionality of exfiltrating sensitive information, including SMS messages, contacts, and media files, while enhancing command execution capabilities. Upon installation, the malicious apps request extensive permissions to operate continuously in the background. The malware uses a dual-channel communication infrastructure, with Firebase Cloud Messaging (FCM) as the primary command channel and a secondary HTTP-based channel for data exfiltration to a command-and-control server. The campaign appears to have concluded, but the evolution of PJobRAT highlights the ongoing threat of sophisticated mobile malware targeting high-value individuals.
AppWizard
March 28, 2025
In 2021, PJobRAT, an Android Remote Access Trojan (RAT), targeted Indian military personnel through deceptive apps. A new campaign was discovered in 2023, focusing on users in Taiwan, with malicious apps like ‘SangaalLite’ and CChat disguised as instant messaging applications. These apps were available for download from WordPress sites, which have since been taken down. The campaign began in January 2023, with domains registered as early as April 2022, and the latest sample detected in October 2024. The number of infections was low, indicating a targeted approach rather than a broad attack. The distribution methods remain unclear, but may involve SEO poisoning, malvertising, or phishing. Once installed, the apps request extensive permissions and feature basic chat functionality. Recent versions of PJobRAT have shifted from stealing WhatsApp messages to executing shell commands, allowing greater control over compromised devices. PJobRAT communicates with its command-and-control (C2) servers using Firebase Cloud Messaging (FCM) and HTTP, enabling the upload of various data types, including SMS, contacts, and files. The now inactive C2 server was located in Germany.
AppWizard
March 19, 2025
26% of players are willing to invest more for superior server hosting in the gaming sector. Liquid Web is hosting a free webinar on March 27th at 2 PM EST titled "How to Start Selling Minecraft Servers," aimed at helping gaming enthusiasts turn their passion into a business. The Minecraft community has over 173 million active players, with one in four willing to invest in enhanced hosting tools to improve performance. Pre-registered attendees will receive four complimentary months of bare metal hosting with an annual plan. The webinar will cover the business opportunity, market potential, technical requirements, reseller process, pricing strategies, and include a Q&A session with experts.
Tech Optimizer
February 3, 2025
Researchers from c/side have discovered a widespread campaign targeting WordPress sites, resulting in over 10,000 compromised sites that distribute info-stealing malware. The attack exploits outdated versions of WordPress and its plugins, employing a "spray and pay" method that affects anyone visiting the infected sites. Users encounter a fake Chrome browser page prompting them to download a malicious update, which steals personal information such as passwords. The malware includes Atomic Stealer, targeting macOS users, and SocGholish, aimed at Windows systems. To protect against these threats, users should verify download sources, keep software updated, use password managers, and consider identity theft protection services.
Search