Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Meta Inc. files suit over privacy concerns over AI smart glasses after employees review nude, sex and other footage

Oura acquires Doublepoint, a startup specializing in gesture recognition technology

Cisco confirms active exploitation of two vulnerabilities in Catalyst SD-WAN Manager

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access
Identity

Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access

userBy userJuly 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 24, 2025Ravi LakshmananCybersecurity/Websecurity

Cybersecurity researchers discover new stealth backdoors hidden within the “Mu-Plugins” directory of WordPress sites, grant threat access and allow any action to be performed.

Required plugins (aka MU-Plugins) are special plugins that are automatically activated on all WordPress sites in your installation. By default, it is located in the “WP-Content/Mu-Plugins” directory.

What makes them attractive to attackers is that MU-Plugin doesn’t appear in the default list of plugins on the WP-Admin plugin page and cannot be disabled except that it removes plugin files from required directories.

Cybersecurity

As a result, some malware that utilizes this technique can function quietly without raising a red flag.

In the infectious disease discovered by web security company Sucuri, a PHP script in the Mu-Plugins directory (“WP-Index.php”) acts as a loader and stores it in the WordPress database in the WP_OPTIONS table under _HDRA_CORE.

The remote payload is taken from an obfuscated URL using ROT13. This is a simple replacement cipher that replaces a character with the 13th character (i.e. a becomes n, b, and c becomes p).

“The fetched content is then temporarily written to disk and executed,” said security researcher Puja Srivastava. “This backdoor provides attackers with permanent access to the site and the ability to run PHP code remotely.

Specifically, it injects the Hidden File Manager into the theme directory as “Pricing-Table-3.Php” and allows threat actors to view, upload, or delete files. You also create an admin user named “Official WP” and download and activate the malicious plugin (“WP-Bot-protect.php”).

In addition to revive the infection in the event of deletion, the malware also includes the ability to change the passwords for common administrator usernames such as “Admin”, “Root”, and “WPSupport” in the default password set by the attacker. This also extends to its own “official WP” users.

Cybersecurity

In doing so, threat actors enjoy permanent access to the site, take malicious actions, and effectively lock other administrators. This ranges from data theft to inserting code that can serve the malware, redirecting visitors to the site.

“Attackers get full admin access and permanent backdoors, allowing the site to do anything from installing more malware to taint it,” says Srivastava. “The characteristics of remote command execution and content injection mean that attackers can change the behavior of the malware.”

To mitigate these threats, it is essential for site owners to regularly update WordPress, themes and plugins, secure their accounts using two-factor authentication, and regularly audit all sections of the site, including themes and plugin files.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe new AI coding challenge has revealed the first results – and they are not pretty
Next Article Maine legislators remove red tape to allow for more affordable home construction
user
  • Website

Related Posts

Post-Quantum Cryptography Webinar for Security Leaders

March 5, 2026

Cisco confirms active exploitation of two vulnerabilities in Catalyst SD-WAN Manager

March 5, 2026

DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

March 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Meta Inc. files suit over privacy concerns over AI smart glasses after employees review nude, sex and other footage

Oura acquires Doublepoint, a startup specializing in gesture recognition technology

Cisco confirms active exploitation of two vulnerabilities in Catalyst SD-WAN Manager

Post-Quantum Cryptography Webinar for Security Leaders

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.