Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Parallel Web Systems reaches $2 billion valuation 5 months after last major funding

SAP-related npm packages compromised in supply chain attack that steals credentials

Bill Gurley and Jack Altman back Pursuit, a startup that helps companies sell to governments

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted
Identity

Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted

By April 28, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 28, 2025Ravi LakshmananWebsite Security/Malware

Cybersecurity researchers have warned about a massive phishing campaign targeting WooCommerce users, prompting them to download “critical patches” with fake security alerts, but instead deploying backdoors.

WordPress Security Company PatchStack described the activity as a refined variant of another campaign observed in December 2023, employing a fake CVE trick to violate sites running popular content management systems (CMS).

Given the similarities between phishing email lures, fake web pages, and the same methods employed to hide malware, the latest attack wave is considered to be either the work of the same threat actor or a new cluster that closely mimics the previous one.

Cybersecurity

“They claim that targeted websites are affected by the (non-existent) “Unrecognized Administrative Access” vulnerability, urging them to use IDN homograph attacks to access phishing websites that disguise themselves as official Woocommerce websites,” Chazz Wolcott said.

Phishing email recipients are recommended to click on the Download Patch link to download and install the expected security fixes. But in doing so, you will redirect them to a page in a spoofed woocommerce marketplace hosted in your domain[.]com ” (note the use of “ė” instead of “e”) can download the zip archive (“authbypass-update-31297-id.zip “).

The victim is then asked to install the patch to install the regular WordPress plugin, effectively unlocking the following series of malicious actions –

After configuring a randomly specified Cron job that sends an HTTP Get Request to the Aust Run Server (“woocommerce-services,” create a new admin-level user with an obfuscated username and a randomized password.[.]com/wpapi “) Send http get request along with information about the username and password, along with URL of the infected website, to download the next stage obfuscation payload from the second server (woocommerce-help[.]com/activate “or” woocommerce-api[.]com/activate”) Decode the payload to extract multiple web shells like Pas-fork, P0WNY, WSO, etc. Hide malicious plugins from list of plugins

Cybersecurity

The ultimate result of the campaign is that it allows attackers to remote the website, inject spam or rough ads, redirect site visitors to a rogue site, register compromised servers in a botnet to carry out DDOS attacks, and even encrypt server resources as part of a long extension scheme.

Users are advised to scan suspicious plugins or administrator accounts to ensure that the software is up to date.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUSYK vs Dubois Rematch: Heavyweight Fight Confirmed July 19 in London | Boxing News
Next Article OmnireTail shakes Africa’s B2B e-commerce market with a $20 million Series A

Related Posts

SAP-related npm packages compromised in supply chain attack that steals credentials

April 29, 2026

New wave of North Korean attacks using AI-embedded npm malware, fake companies, and RATs

April 29, 2026

How to automate exposure verification at the speed of AI attacks

April 29, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Parallel Web Systems reaches $2 billion valuation 5 months after last major funding

SAP-related npm packages compromised in supply chain attack that steals credentials

Bill Gurley and Jack Altman back Pursuit, a startup that helps companies sell to governments

Uber is now entering the hotel business thanks to AI

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.