Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

Google is testing a vibe coding app called Opal

SOCO404 and Koske malware target cloud services with cross-platform encryption attacks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access
Identity

Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access

userBy userJuly 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 24, 2025Ravi LakshmananCybersecurity/Websecurity

Cybersecurity researchers discover new stealth backdoors hidden within the “Mu-Plugins” directory of WordPress sites, grant threat access and allow any action to be performed.

Required plugins (aka MU-Plugins) are special plugins that are automatically activated on all WordPress sites in your installation. By default, it is located in the “WP-Content/Mu-Plugins” directory.

What makes them attractive to attackers is that MU-Plugin doesn’t appear in the default list of plugins on the WP-Admin plugin page and cannot be disabled except that it removes plugin files from required directories.

Cybersecurity

As a result, some malware that utilizes this technique can function quietly without raising a red flag.

In the infectious disease discovered by web security company Sucuri, a PHP script in the Mu-Plugins directory (“WP-Index.php”) acts as a loader and stores it in the WordPress database in the WP_OPTIONS table under _HDRA_CORE.

The remote payload is taken from an obfuscated URL using ROT13. This is a simple replacement cipher that replaces a character with the 13th character (i.e. a becomes n, b, and c becomes p).

“The fetched content is then temporarily written to disk and executed,” said security researcher Puja Srivastava. “This backdoor provides attackers with permanent access to the site and the ability to run PHP code remotely.

Specifically, it injects the Hidden File Manager into the theme directory as “Pricing-Table-3.Php” and allows threat actors to view, upload, or delete files. You also create an admin user named “Official WP” and download and activate the malicious plugin (“WP-Bot-protect.php”).

In addition to revive the infection in the event of deletion, the malware also includes the ability to change the passwords for common administrator usernames such as “Admin”, “Root”, and “WPSupport” in the default password set by the attacker. This also extends to its own “official WP” users.

Cybersecurity

In doing so, threat actors enjoy permanent access to the site, take malicious actions, and effectively lock other administrators. This ranges from data theft to inserting code that can serve the malware, redirecting visitors to the site.

“Attackers get full admin access and permanent backdoors, allowing the site to do anything from installing more malware to taint it,” says Srivastava. “The characteristics of remote command execution and content injection mean that attackers can change the behavior of the malware.”

To mitigate these threats, it is essential for site owners to regularly update WordPress, themes and plugins, secure their accounts using two-factor authentication, and regularly audit all sections of the site, including themes and plugin files.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe new AI coding challenge has revealed the first results – and they are not pretty
Next Article Maine legislators remove red tape to allow for more affordable home construction
user
  • Website

Related Posts

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

July 25, 2025

SOCO404 and Koske malware target cloud services with cross-platform encryption attacks

July 25, 2025

Overcoming the risks from using Chinese genai tools

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

Google is testing a vibe coding app called Opal

SOCO404 and Koske malware target cloud services with cross-platform encryption attacks

The first wave of UK HAR1 projects is set to create more than 700 jobs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.