This backdoor malware can function as a standalone script or as a plug-in, and its features enable attackers to control and monetize victim sites at the expense of SEO rankings and user privacy. The malware can activate or deactivate arbitrary plug-ins remotely, allowing attackers to disable unwanted plug-ins and activate the malicious plug-in when needed. As the malicious file runs as a plug-in within WordPress, it has access to normal WordPress functionality like other plug-ins, making it even more dangerous.
One of the main functionalities of this malicious plug-in is the creation of an admin account using the “wp_create_user” function. The account is given the username “superadmin” and a hardcoded password, which allows the attacker to become a website administrator. Once the victim’s site has been compromised successfully, the account is removed to erase traces and minimize the chances of detection. The presence of user creation with hardcoded passwords should be considered a red flag.
The malicious plug-in also contains bot detection code, which is commonly found in malware on websites that serve normal content to some visitors while showing malicious content to others. Site owners often report that their site appears fine to them, but their visitors complain about spam or being redirected to dubious sites. This form of malware wants search engines to find the malicious content, so it is typically only shown when indexing a site. Threat actors use keyword stuffing to increase traffic to infected sites, leading to a sudden, unexpected surge in site traffic when targeted by an infection. While the presence of bot detection code alone cannot confirm the presence of malicious activity, it is suspicious and warrants further investigation.
WordPress sites are vulnerable to attacks through plug-ins, making them a significant target for threat actors. Malicious and vulnerable plug-ins are often the gateway for attacks, with site operators often unaware of the issues until their websites are already under active attack. It is crucial for anyone building websites using WordPress to follow security best practices and configure their sites to remain as protected as possible. Additionally, including some form of security monitoring is advised to detect any compromises even after implementing security measures.
In conclusion, the discovery of this sophisticated malware hidden within a WordPress caching plug-in highlights the ongoing threat to website security. The ability of this malware to create an admin account and remotely control plug-ins gives attackers full control over infected websites. WordPress site owners should remain vigilant and implement security best practices to protect their websites from such threats. Regularly monitoring for compromised websites is also essential to identify and respond to any security breaches promptly.
<< photo by Slava Auchynnikau >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- How Cybercriminals Exploit 404 Pages to Steal Sensitive Information
- The Rise of Balada Injector: Uncovering the Exploitation of 17,000 WordPress Sites
- 404 Error Pages: The Latest Weapon in Magecart’s Web Skimmer Arsenal
- Unmasking the Hidden Threat: U.K. and U.S. Jointly Sanction 11 Russia-based Trickbot Cybercrime Gang Members
- The Silent Invasion: Unmasking the Hidden Threat of Stealthy APK Compression
- The Vulnerability Within: Uncovering the Hidden Threat to 5G Mobile Networks