This figure could even be higher, according to the researchers.
At the beginning of December of last year, there was something similar.
Experts indicate that it could be related.

As we know, WordPress is one of the most used content managing platform by users.
Many websites are developed on this platform.
The attack is quite simple.

The malicious code includes two parts.
For the administrator login page, the code loads a keylogger hosted in a third-party domain.
In the campaign of the end of 2017, the criminals loaded their keylogger from the domain cloudflare.solutions.

The recommended thing in these cases is to update WordPress.
Keeping the latest versions makes it easier for us to deal with threats like these.
It is also important to verify that the page is not loading any suspicious scripts.

As mentioned, this campaign has been running since April 2017, and for most of 2017.
However, last month this group changed the practice of collecting administrator credentials through keylogger.
In a previous article, we talked about some tips to keep WordPress safe.
Basic things we must do.
Having tools and security programs is very important.
As a keylogger can collect all our credentials and personal data.
So, what do you think about this?
Simply share all your views and thoughts in the comment section below.