Malicious WordPress Plugin Targets Windows Users with Fake Java Update Pop-Up

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

WordPress users are targeted through a seemingly legitimate stealthy plugin, deploying deceptive “Java Update” pop-ups that aim to compromise website visitors. Its primary goal is to inject a counterfeit Java update prompt into the site's frontend code.

The attack uses a plugin masquerading as “Yoast SEO” and residing within the /wp-content/plugins/contact-form/ directory, according to Sucuri researchers. 

The plugin leverages several evasion tactics, such as fake branding and cloaking, selective targeting, and social engineering.

Fake Java pop-up on a WordPress site
Fake Java pop-up on a WordPress site | Source: Sucuri

It mimics respected plugins and manipulates metadata to avoid suspicion. Additionally, it hides itself from the WordPress admin dashboard, complicating detection and removal. 

The injected JavaScript checks device parameters, targeting primarily Windows users and avoiding mobile devices or systems running macOS or Safari.

Random executable downloaded in the process
Random executable downloaded in the process | Source: Sucuri

The pop-up simulates a genuine Java update, complete with localized text, a progress bar, and a download link. Victims who interact may unwittingly download and execute a malicious .exe file from a third-party domain.

Core infection vectors include persistent injection, session and cookie management, and process monitoring and exfiltration.

The massive JavaScript block embedded in the HTML head section dynamically manages the deceptive pop-up and handles post-interaction events. The plugin manages cookies and session variables to control pop-up frequency and track user actions.

After initiating a download, the malware uses system commands like tasklist to monitor for execution of the malicious payload, sending real-time notifications to attackers via Telegram. It also exfiltrates browser data and tracks if a user’s system runs known malicious processes.

End-users risk system compromise, data exfiltration, and post-infection malicious activity, while website owners face reputational harm and potential search engine blacklisting.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: