Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access
Identity

Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access

userBy userJuly 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 24, 2025Ravi LakshmananCybersecurity/Websecurity

Cybersecurity researchers discover new stealth backdoors hidden within the “Mu-Plugins” directory of WordPress sites, grant threat access and allow any action to be performed.

Required plugins (aka MU-Plugins) are special plugins that are automatically activated on all WordPress sites in your installation. By default, it is located in the “WP-Content/Mu-Plugins” directory.

What makes them attractive to attackers is that MU-Plugin doesn’t appear in the default list of plugins on the WP-Admin plugin page and cannot be disabled except that it removes plugin files from required directories.

Cybersecurity

As a result, some malware that utilizes this technique can function quietly without raising a red flag.

In the infectious disease discovered by web security company Sucuri, a PHP script in the Mu-Plugins directory (“WP-Index.php”) acts as a loader and stores it in the WordPress database in the WP_OPTIONS table under _HDRA_CORE.

The remote payload is taken from an obfuscated URL using ROT13. This is a simple replacement cipher that replaces a character with the 13th character (i.e. a becomes n, b, and c becomes p).

“The fetched content is then temporarily written to disk and executed,” said security researcher Puja Srivastava. “This backdoor provides attackers with permanent access to the site and the ability to run PHP code remotely.

Specifically, it injects the Hidden File Manager into the theme directory as “Pricing-Table-3.Php” and allows threat actors to view, upload, or delete files. You also create an admin user named “Official WP” and download and activate the malicious plugin (“WP-Bot-protect.php”).

In addition to revive the infection in the event of deletion, the malware also includes the ability to change the passwords for common administrator usernames such as “Admin”, “Root”, and “WPSupport” in the default password set by the attacker. This also extends to its own “official WP” users.

Cybersecurity

In doing so, threat actors enjoy permanent access to the site, take malicious actions, and effectively lock other administrators. This ranges from data theft to inserting code that can serve the malware, redirecting visitors to the site.

“Attackers get full admin access and permanent backdoors, allowing the site to do anything from installing more malware to taint it,” says Srivastava. “The characteristics of remote command execution and content injection mean that attackers can change the behavior of the malware.”

To mitigate these threats, it is essential for site owners to regularly update WordPress, themes and plugins, secure their accounts using two-factor authentication, and regularly audit all sections of the site, including themes and plugin files.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe new AI coding challenge has revealed the first results – and they are not pretty
Next Article Maine legislators remove red tape to allow for more affordable home construction
user
  • Website

Related Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

September 10, 2025

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

September 10, 2025

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

September 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.