Cybersecurity researchers have uncovered a sophisticated attack targeting WordPress websites through a stealthy backdoor embedded within the must-use plugins (mu-plugins) directory. This hidden backdoor leverages the “wp-index.php” file to execute malicious code and provide attackers persistent administrative access. Unlike standard plugins, mu-plugins are auto-enabled and not visible in the admin dashboard, making them a perfect hiding spot for malware. In this campaign, the malicious script retrieves an obfuscated second-stage payload using a ROT13 cipher, writes it temporarily to disk, and executes it to gain control over the site. This method is particularly dangerous because it allows attackers to remain undetected. Once inside, the malware installs a hidden file manager in the theme directory, creates a rogue administrator account named “officialwp,” and activates a malicious plugin called “wp-bot-protect.php.” Additionally, it can reset passwords of existing admin accounts to ensure continued access. These capabilities enable attackers to execute remote commands, steal data, serve malware, or redirect visitors to malicious sites. The use of WordPress’s core infrastructure to mask the attack makes it harder for users to detect the compromise. To safeguard against such threats, website administrators should regularly update WordPress core files, themes, and plugins. Implementing two-factor authentication and strong password policies can further strengthen security. It's also important to monitor the mu-plugins directory and conduct periodic audits of plugin and theme files. Removing unfamiliar or suspicious files promptly and using a reliable security plugin for malware scanning can help mitigate risks and maintain site integrity.
The Apache Software Foundation has issued a new security advisory detailing three vulnerabilities affecting Apache Kylin, a high-concurrency OLAP engine used widely in big data ana...
NVIDIA has released a critical security update to address several vulnerabilities discovered in its NVIDIA App software for Windows. These flaws, if exploited, could allow local at...
The security of the open-source supply chain was tested again when researchers from JFrog discovered a malicious PyPI package called SoopSocks (XRAY-725599). Ostensibly advertised ...