The words GrayCharlie Targets WordPress appear in bold red text on a white banner over a background of colorful digital glitch patterns.

GrayCharlie Injects Malicious JavaScript into WordPress Sites to Deliver NetSupport RAT and Stealc

By Published On: February 24, 2026

 

For organizations relying on WordPress, a new and insidious threat has emerged, silently compromising websites to PUSH malware onto unsuspecting users. A threat actor, identified as GrayCharlie, has been actively exploiting WordPress vulnerabilities since mid-2023, meticulously embedding malicious JavaScript. This sophisticated campaign delivers potent malware, primarily NetSupport RAT and Stealc, granting attackers extensive control and data exfiltration capabilities. Understanding GrayCharlie’s tactics and implementing robust defenses is paramount for digital security professionals.

GrayCharlie’s Modus Operandi: Malicious JavaScript Injection

GrayCharlie’s primary attack vector involves injecting surreptitious JavaScript into compromised WordPress sites. This malicious code operates in the background, entirely unbeknownst to the website owner or administrator. When a user visits an infected WordPress site, the embedded JavaScript executes, initiating the download and installation of the malware payload. This technique effectively weaponizes trusted websites, turning them into unwitting distributors of harmful software.

The group’s operational overlap with the previously tracked SmartApeSG cluster, also known as ZPHP or HANEMONEY, signifies a persistent and evolving threat landscape. This attribution suggests a seasoned adversary continually refining their attack methodologies and infrastructure.

The Payload: NetSupport RAT and Stealc

The malware deployed by GrayCharlie represents a significant threat to user systems:

  • NetSupport RAT (Remote Access Trojan): This powerful RAT grants attackers comprehensive control over infected machines. Capabilities include remote desktop access, file exfiltration, keylogging, and the ability to deploy additional malicious payloads. NetSupport Manager, a legitimate remote administration tool, is often abused in these attacks, making detection challenging as it might blend with legitimate network traffic.
  • Stealc: While not elaborated upon in the source, Stealc is typically associated with information stealer malware. Such malware is designed to exfiltrate sensitive data, including credentials, financial information, and personal files, from infected systems. The combination of a RAT and an info-stealer provides GrayCharlie with both immediate control and long-term data collection capabilities.

WordPress Vulnerabilities and Attack Vectors

While the specific vulnerabilities exploited by GrayCharlie are not detailed in the source, common WordPress attack vectors that facilitate JavaScript injection include:

  • Outdated WordPress Core, Themes, or Plugins: Unpatched software often contains known vulnerabilities that attackers can exploit to gain unauthorized access or inject malicious code.
  • Weak Administrator Credentials: Brute-force attacks or credential stuffing can compromise WordPress administration panels, allowing attackers to modify site files.
  • Insecure File Permissions: Improperly configured file permissions can enable attackers to write malicious scripts to web server directories.
  • Cross-Site Scripting (XSS): Reflected or stored XSS vulnerabilities, particularly within themes or plugins, can allow attackers to inject client-side scripts.

Organizations should review their WordPress security posture rigorously to identify and mitigate these common weaknesses.

Remediation Actions for WordPress Users

Proactive security measures are critical to protect against threats like GrayCharlie. Site administrators and security teams should implement the following:

  • Immediate Software Updates: Ensure WordPress core, all themes, and all plugins are updated to their latest versions. Automate updates where feasible and regularly audit for discrepancies.
  • Strong, Unique Passwords: Enforce strong, unique passwords for all WordPress user accounts, especially administrators. Implement multi-factor authentication (MFA) for an added layer of security.
  • Regular Security Audits and Scans: Utilize security plugins and external scanning tools to regularly check WordPress sites for known vulnerabilities, suspicious file changes, and embedded malicious code.
  • File Integrity Monitoring (FIM): Implement FIM solutions to detect unauthorized modifications to critical WordPress files. This can alert administrators to injected JavaScript or compromised files.
  • Web Application Firewall (WAF): Deploy a WAF to filter and monitor HTTP traffic between web applications and the internet. A WAF can detect and block malicious requests, including attempts to inject JavaScript or exploit known vulnerabilities.
  • Principle of Least Privilege: Grant users and applications only the necessary permissions to perform their functions. Restrict file write permissions for directories where malicious scripts are commonly injected.

Tools for Detection and Mitigation

Leveraging appropriate tools is essential for maintaining a secure WordPress environment:

Tool Name Purpose Link
Wordfence Security WordPress security plugin for firewall, malware scan, and login security. https://www.wordfence.com/
Sucuri Security Cloud-based website security platform offering WAF, malware removal, and CDN. https://sucuri.net/
WPScan WordPress vulnerability scanner (command-line tool) for detecting outdated components. https://wpscan.com/
Imunify360 Comprehensive security suite for web servers, including WAF, malware scanner, and patch management. https://www.imunify360.com/

Conclusion

The activities of GrayCharlie underscore the persistent and evolving nature of cyber threats targeting widely used platforms like WordPress. Their tactic of injecting malicious JavaScript to deliver NetSupport RAT and Stealc represents a significant risk to both site administrators and their users. Vigilance through continuous monitoring, rigorous patching schedules, and the strategic deployment of security tools are not optional but essential for safeguarding digital assets against such sophisticated adversaries.

 

Share this article

Leave A Comment