Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked hackers use TernDoor, PeerTime, and BruteEntry in communications attacks in South America

High-performance large language models for Europe

Microsoft reveals ClickFix campaign to deploy Lumma Stealer using Windows Terminal

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit WordPress Mu-Plugins to inject SPAM and hijacking site images
Identity

Hackers exploit WordPress Mu-Plugins to inject SPAM and hijacking site images

userBy userMarch 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 31, 2025Ravi LakshmananData Theft/Website Security

Hackers abuse WordPress

Threat actors use the “Mu-Plugins” directory of WordPress sites to hide malicious code with the aim of maintaining permanent remote access and redirecting site visitors to fake sites.

MU-Plugins, short for Required Plugins, refers to plugins in special directories (“WP Content/MU-Plugins”) that are automatically run by WordPress without explicitly enabling them via the admin dashboard. This makes the directory an ideal location for staging malware.

“This approach represents a concerning trend as MU-Plugins (required plugins) are not listed in the standard WordPress plugin interface, making it easier for users to ignore during routine security checks.”

Cybersecurity

In an incident analyzed by a website security company, three different types of rogue PHP code were discovered in the directory –

“WP-Content/Mu-Plugins/Redirect.php” redirects site visitors to an external malicious website “WP-Content/Mu-Plugins/index.php”. There is unwanted spam on infected websites that are likely to be intent on promoting scams or manipulating SEO rankings by exchanging all images on the site for explicit content and hijacking outbound links to malicious sites.

“redirect.php” said it was spoofing a web browser update to deceive victims to steal data and install malware that could drop additional payloads.

“The script contains a function that identifies whether the current visitor is a bot,” explained Srivastava. “This will remove the search engine crawler and prevent the script from detecting redirection behavior.”

It supplies a common tactic called Clickfix, as threat actors continue to use infected WordPress sites as staging grounds, tricking website visitors, continuing to run malicious PowerShell commands on Windows computers under the guise of Google Recaptcha or Cloudflare Captcha verification – and providing Lumma Stealer Malware.

Hackers abuse WordPress

Hacked WordPress sites are also used to deploy malicious JavaScript that can redirect visitors to unwanted third-party domains and allow skimmer financial information entered on the checkout page to act as a skimmer.

Currently, we don’t know how the site was compromised, but the usual suspects are vulnerable plugins or themes, compromised administrator credentials, and server misconceptions.

Cybersecurity

According to a new report from PatchStack, threat actors have been using four different security vulnerabilities on a daily basis since the beginning of the year –

CVE-2024-27956 (CVSS Score: 9.9) – Merciless arbitrary generic SQL execution vulnerability in WordPress automatic plugins – AI content generator and automatic poster plugins CVE-2024-25600 (CVSS Score: 10.0) – Merciless remote code execution vulnerability in CVS – Merciless PHP object injection into remote code execution vulnerability in givewp plugin CVE – 2024-4345 (CVSS Score: 10.0)

To mitigate the risks posed by these threats, it is essential for WordPress site owners to keep plugins and themes up-to-date, routinely audit code regarding the presence of malware, enforce strong passwords, deploy web application firewalls to malicious requests, and prevent code injection.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe venue will be held at International Confex Center Stage
Next Article Copa del Rey: Real Madrid, Barcelona semifinals – Start, Date, Lineup, News | Football News
user
  • Website

Related Posts

China-linked hackers use TernDoor, PeerTime, and BruteEntry in communications attacks in South America

March 6, 2026

Microsoft reveals ClickFix campaign to deploy Lumma Stealer using Windows Terminal

March 6, 2026

Hikvision and Rockwell Automation CVSS 9.8 defects added to CISA KEV catalog

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked hackers use TernDoor, PeerTime, and BruteEntry in communications attacks in South America

High-performance large language models for Europe

Microsoft reveals ClickFix campaign to deploy Lumma Stealer using Windows Terminal

Hikvision and Rockwell Automation CVSS 9.8 defects added to CISA KEV catalog

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.