Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Taco Bell rethinks about relying on AI at drive-thru

The fall of EV startup Fisker: A comprehensive timeline

I was really impressed with this $400 portable projector

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » WordPress fake security plugin enables remote administrator access for attackers
Identity

WordPress fake security plugin enables remote administrator access for attackers

userBy userMay 1, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 1, 2025Ravi LakshmananMalware/Web Skimming

WordPress fake security plugin

Cybersecurity researchers are shedding light on a new campaign targeting WordPress sites that disguise malware as security plugins.

The plugin named “WP-Antymalwary-bot.php” comes with a variety of features to keep access, hide from the admin dashboard, and run remote code.

“It also includes ping functionality that allows you to report to command and control (C&C) servers, similar to the code that helps spread malware to other directories and inject malicious JavaScript responsible for serving ads,” Wordfence’s Marco Wotschka said in the report.

The malware first discovered in the site cleanup effort in late January 2025 was detected in the wild with a new variant. Some of the other names used for plugins are listed below –

addons.php wpconsole.php wp-performance-booster.php scr.php

Once installed and activated, it provides administrator access for threat actors to the dashboard and makes remote code execution easier by injecting malicious PHP code into site theme header files, or clearing caches for popular cache plugins.

Cybersecurity

New iterations of malware include notable changes to the manners in which code injections are handled, fetching JavaScript code hosted in another compromised domain to provide ads or spam.

The plugin is also complemented by a malicious WP-Cron.php file that automatically reproduces and reproduces malware on the next site visit if it is removed from the plugin directory.

Currently, it is not clear how the site is violated to deliver malware or who is behind the campaign. However, the presence of Russian comments and messages probably indicates that threat actors speak Russian.

This disclosure has now detailed a web skimmer campaign that uses a fake font domain named italicfonts.[.]org “Displays fake payment forms on the checkout page, steals the information entered, and removes data to the attacker’s server.

Another “advanced multi-stage carding attack” considered by the website security company targets the Magento e-commerce portal with JavaScript malware designed to harvest a wide range of sensitive information.

“The malware leveraged fake GIF image files, local browser SessionStorage data, and used malicious reverse proxy servers to tamper with website traffic and promoted credit card data, login details, cookies and other sensitive data from websites that compromise credit card data, log-in details, cookies and other sensitive data.”

A GIF file is actually a PHP script that acts as a reverse proxy by capturing incoming requests and collecting the information needed when a site visitor lands on a checkout page.

It has been observed that enemy injects Google AdSense code into at least 17 WordPress sites in various locations with the goal of delivering unwanted ads and generating revenue either on a click-by-click or impressive basis.

“They are trying to continue using resources on your site to serve ads, but even worse, if you use AdSense yourself, you may be stealing the revenue from your ads,” says security researcher Puja Srivastava. “By injecting your own Google AdSense code, they’ll be paid for you.”

Cybersecurity

That’s not all. The verification of deceit capt provided on compromised websites is designed to allow users to tunnel malicious traffic through the socks5 proxy by collecting system information, granting remote access, and tricking down node.js-based backdoor downloading and running node.js-based backdoors that deploy remote access.

This activity is attributed to a traffic distribution system (TDS), called Kongtuke (aka 404 TDS, Chaya_002, Landupdate808, and TAG-124) by TrustWave SpiderLabs.

“The JS scripts dropped after infection are designed as multifunctional backdoors that can maintain detailed system reconnaissance, remote command execution, tunnel network traffic (Socks5 proxy), and permanent access to secrets.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMavryk secures $300 million deals with MAG and Multibank in its biggest real estate RWA tokenization to date
Next Article Thai prosecutors say they will not pursue a royal defamation case against American scholars
user
  • Website

Related Posts

Attackers abuse Velociraptor’s forensic tools for deploying Visual Studio code for C2 tunneling

August 30, 2025

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Taco Bell rethinks about relying on AI at drive-thru

The fall of EV startup Fisker: A comprehensive timeline

I was really impressed with this $400 portable projector

Attackers abuse Velociraptor’s forensic tools for deploying Visual Studio code for C2 tunneling

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.