DollyWay World Domination: Eight Years of Evolving Website Malware Campaigns By Denis Sinegubko Published: 2025-03-17 · Archived: 2026-04-05 22:32:03 UTC Key findings  GoDaddy Security researchers have uncovered a long-running malware operation dating back to 2016 that has compromised over 20,000 websites globally in the past 8 years.    Campaign infrastructure currently leverages a distributed network of compromised WordPress sites as TDS and Command and Control (C2) nodes.  The latest campaign (DollyWay) demonstrates sophisticated capabilities including cryptographically signed data transfers, heterogeneous injection methods, and automatic reinfection mechanisms.  Threat actors attempt to maintain control of compromised sites by removing any competing malware and updating WordPress. Overview  GoDaddy Security researchers have uncovered evidence linking multiple malware campaigns into a single, long-running operation we've named "DollyWay World Domination". While previously thought to be separate campaigns, our research reveals these attacks share common infrastructure, code patterns, and monetization methods - all appearing to be connected to a single sophisticated threat actor. The operation was named after the following tell-tale string, which is found in some variations of the malware: define('DOLLY_WAY', 'World Domination');.   Through extensive analysis spanning eight years of data, we’ve connected seemingly disparate campaigns including Master134, Fake Browser Updates, and CountsTDS into a comprehensive operational timeline. The current iteration, which we track as DollyWay v3, primarily targets visitors of infected WordPress sites via injected redirect scripts that employ a distributed network of Traffic Direction System (TDS ) nodes hosted on compromised websites. These scripts redirect site visitors to various scam pages through traffic broker networks associated with VexTrio, one of the largest known cybercriminal affiliate networks that leverages sophisticated DNS techniques, traffic distribution systems, and domain generation algorithms to deliver malware and scams across global networks. While current monetization relies heavily on redirects, historical campaigns from this actor included more aggressive payloads like ransomware and banking trojans.  The operation comprises several distinct campaigns known by different names in the security community:  Master134 (2016-2020): First identified by CheckPoint researchers in 2018  Fake Browser Updates (2018-2019)  CountsTDS / DollyRAT / Backdoor.PHP.DOLLYWAY.A / Multistage WordPress Redirect Kit / R_Evil web shell (2020-present)  The latest variant of DollyWay malware demonstrates significant sophistication, employing multiple layers of obfuscation, cryptographic verification of malicious payloads, and reinfection mechanisms.   DollyWay: Massive scale and ongoing evolution  The DollyWay malware works exclusively on WordPress sites. Leveraging a distributed network of C2 and TDS nodes hosted on compromised sites, it redirects site visitors to VexTrio/LosPollos links. Historically, this operation has also used AdsTerra, PropellerAds and some other ad networks to monetize traffic from compromised sites.  https://www.godaddy.com/resources/news/dollyway-world-domination Page 1 of 19 This campaign is known for its sophisticated ways of infecting websites:  Cryptographically signed data transfers  Heterogeneous injection spread across files and database  Automatic reinfection mechanisms  Removal of competing third-party malware  WordPress updates and site repairs  As of February 2025, we have seen over 10,000 unique infected WordPress sites worldwide generating around 10 million impressions of web pages with injected malicious scripts for millions of visitors with unique IP addresses every month.  Technical analysis of current campaign (DollyWay v3)  In this post, we will refer to the ongoing malicious campaign as DollyWay v3. Version 3 uses wp-content/counts.php scripts on select compromised sites as C2/TDS, while previous versions of DollyWay malware used different file names.   Redirect script injections  DollyWay v3 employs a sophisticated four-stage injection chain designed to evade detection.   Stage 1: Initial injection  The first stage leverages WordPress's wp_enqueue_script function to append a link to a dynamically generated script loading from the site's main URL whenever someone visits an infected domain. Each injection includes a unique 32- character hexadecimal parameter — an MD5 hash that serves as a site identifier and is different for each infected site.   From now on, we’ll refer to the initial hexadecimal string as and its derivatives as md5(hex32), md5(md5(hex32)) and so on, depending on how many times md5 function was applied.  The pattern for the Stage 1 injection is:  Example with a redacted domain of an infected site: