Cybersecurity researchers have uncovered a sophisticated attack targeting WordPress websites through a stealthy backdoor embedded within the must-use plugins (mu-plugins) directory. This hidden backdoor leverages the “wp-index.php” file to execute malicious code and provide attackers persistent administrative access. Unlike standard plugins, mu-plugins are auto-enabled and not visible in the admin dashboard, making them a perfect hiding spot for malware. In this campaign, the malicious script retrieves an obfuscated second-stage payload using a ROT13 cipher, writes it temporarily to disk, and executes it to gain control over the site. This method is particularly dangerous because it allows attackers to remain undetected. Once inside, the malware installs a hidden file manager in the theme directory, creates a rogue administrator account named “officialwp,” and activates a malicious plugin called “wp-bot-protect.php.” Additionally, it can reset passwords of existing admin accounts to ensure continued access. These capabilities enable attackers to execute remote commands, steal data, serve malware, or redirect visitors to malicious sites. The use of WordPress’s core infrastructure to mask the attack makes it harder for users to detect the compromise. To safeguard against such threats, website administrators should regularly update WordPress core files, themes, and plugins. Implementing two-factor authentication and strong password policies can further strengthen security. It's also important to monitor the mu-plugins directory and conduct periodic audits of plugin and theme files. Removing unfamiliar or suspicious files promptly and using a reliable security plugin for malware scanning can help mitigate risks and maintain site integrity.
A Chinese state-sponsored advanced persistent threat (APT) group has been linked to the compromise of a military organization based in the Philippines through the deployment of a n...
Cybersecurity experts have detected two new malware families: CHILLYHELL, a macOS backdoor with modularity, and ZynorRAT, a remote access trojan using Go for Windows and Linux syst...
Siemens has issued a critical security advisory regarding a newly discovered vulnerability in its SIMATIC Virtualization as a Service (SIVaaS) platform. Tracked as CVE-2025-40804, ...