Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit WordPress Mu-Plugins to inject SPAM and hijacking site images
Identity

Hackers exploit WordPress Mu-Plugins to inject SPAM and hijacking site images

userBy userMarch 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 31, 2025Ravi LakshmananData Theft/Website Security

Hackers abuse WordPress

Threat actors use the “Mu-Plugins” directory of WordPress sites to hide malicious code with the aim of maintaining permanent remote access and redirecting site visitors to fake sites.

MU-Plugins, short for Required Plugins, refers to plugins in special directories (“WP Content/MU-Plugins”) that are automatically run by WordPress without explicitly enabling them via the admin dashboard. This makes the directory an ideal location for staging malware.

“This approach represents a concerning trend as MU-Plugins (required plugins) are not listed in the standard WordPress plugin interface, making it easier for users to ignore during routine security checks.”

Cybersecurity

In an incident analyzed by a website security company, three different types of rogue PHP code were discovered in the directory –

“WP-Content/Mu-Plugins/Redirect.php” redirects site visitors to an external malicious website “WP-Content/Mu-Plugins/index.php”. There is unwanted spam on infected websites that are likely to be intent on promoting scams or manipulating SEO rankings by exchanging all images on the site for explicit content and hijacking outbound links to malicious sites.

“redirect.php” said it was spoofing a web browser update to deceive victims to steal data and install malware that could drop additional payloads.

“The script contains a function that identifies whether the current visitor is a bot,” explained Srivastava. “This will remove the search engine crawler and prevent the script from detecting redirection behavior.”

It supplies a common tactic called Clickfix, as threat actors continue to use infected WordPress sites as staging grounds, tricking website visitors, continuing to run malicious PowerShell commands on Windows computers under the guise of Google Recaptcha or Cloudflare Captcha verification – and providing Lumma Stealer Malware.

Hackers abuse WordPress

Hacked WordPress sites are also used to deploy malicious JavaScript that can redirect visitors to unwanted third-party domains and allow skimmer financial information entered on the checkout page to act as a skimmer.

Currently, we don’t know how the site was compromised, but the usual suspects are vulnerable plugins or themes, compromised administrator credentials, and server misconceptions.

Cybersecurity

According to a new report from PatchStack, threat actors have been using four different security vulnerabilities on a daily basis since the beginning of the year –

CVE-2024-27956 (CVSS Score: 9.9) – Merciless arbitrary generic SQL execution vulnerability in WordPress automatic plugins – AI content generator and automatic poster plugins CVE-2024-25600 (CVSS Score: 10.0) – Merciless remote code execution vulnerability in CVS – Merciless PHP object injection into remote code execution vulnerability in givewp plugin CVE – 2024-4345 (CVSS Score: 10.0)

To mitigate the risks posed by these threats, it is essential for WordPress site owners to keep plugins and themes up-to-date, routinely audit code regarding the presence of malware, enforce strong passwords, deploy web application firewalls to malicious requests, and prevent code injection.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe venue will be held at International Confex Center Stage
Next Article Copa del Rey: Real Madrid, Barcelona semifinals – Start, Date, Lineup, News | Football News
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Enabling remote hijacking via critical duffer camera defect ONVIF and file upload exploit

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.