Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Wisconsin and Nill Collective say in the lawsuit that Miami induces an inappropriately induced footballer

Federal judge blocks Trump’s efforts to prevent Harvard from hosting foreign students

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » WordPress fake security plugin enables remote administrator access for attackers
Identity

WordPress fake security plugin enables remote administrator access for attackers

userBy userMay 1, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 1, 2025Ravi LakshmananMalware/Web Skimming

WordPress fake security plugin

Cybersecurity researchers are shedding light on a new campaign targeting WordPress sites that disguise malware as security plugins.

The plugin named “WP-Antymalwary-bot.php” comes with a variety of features to keep access, hide from the admin dashboard, and run remote code.

“It also includes ping functionality that allows you to report to command and control (C&C) servers, similar to the code that helps spread malware to other directories and inject malicious JavaScript responsible for serving ads,” Wordfence’s Marco Wotschka said in the report.

The malware first discovered in the site cleanup effort in late January 2025 was detected in the wild with a new variant. Some of the other names used for plugins are listed below –

addons.php wpconsole.php wp-performance-booster.php scr.php

Once installed and activated, it provides administrator access for threat actors to the dashboard and makes remote code execution easier by injecting malicious PHP code into site theme header files, or clearing caches for popular cache plugins.

Cybersecurity

New iterations of malware include notable changes to the manners in which code injections are handled, fetching JavaScript code hosted in another compromised domain to provide ads or spam.

The plugin is also complemented by a malicious WP-Cron.php file that automatically reproduces and reproduces malware on the next site visit if it is removed from the plugin directory.

Currently, it is not clear how the site is violated to deliver malware or who is behind the campaign. However, the presence of Russian comments and messages probably indicates that threat actors speak Russian.

This disclosure has now detailed a web skimmer campaign that uses a fake font domain named italicfonts.[.]org “Displays fake payment forms on the checkout page, steals the information entered, and removes data to the attacker’s server.

Another “advanced multi-stage carding attack” considered by the website security company targets the Magento e-commerce portal with JavaScript malware designed to harvest a wide range of sensitive information.

“The malware leveraged fake GIF image files, local browser SessionStorage data, and used malicious reverse proxy servers to tamper with website traffic and promoted credit card data, login details, cookies and other sensitive data from websites that compromise credit card data, log-in details, cookies and other sensitive data.”

A GIF file is actually a PHP script that acts as a reverse proxy by capturing incoming requests and collecting the information needed when a site visitor lands on a checkout page.

It has been observed that enemy injects Google AdSense code into at least 17 WordPress sites in various locations with the goal of delivering unwanted ads and generating revenue either on a click-by-click or impressive basis.

“They are trying to continue using resources on your site to serve ads, but even worse, if you use AdSense yourself, you may be stealing the revenue from your ads,” says security researcher Puja Srivastava. “By injecting your own Google AdSense code, they’ll be paid for you.”

Cybersecurity

That’s not all. The verification of deceit capt provided on compromised websites is designed to allow users to tunnel malicious traffic through the socks5 proxy by collecting system information, granting remote access, and tricking down node.js-based backdoor downloading and running node.js-based backdoors that deploy remote access.

This activity is attributed to a traffic distribution system (TDS), called Kongtuke (aka 404 TDS, Chaya_002, Landupdate808, and TAG-124) by TrustWave SpiderLabs.

“The JS scripts dropped after infection are designed as multifunctional backdoors that can maintain detailed system reconnaissance, remote command execution, tunnel network traffic (Socks5 proxy), and permanent access to secrets.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMavryk secures $300 million deals with MAG and Multibank in its biggest real estate RWA tokenization to date
Next Article Thai prosecutors say they will not pursue a royal defamation case against American scholars
user
  • Website

Related Posts

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Wisconsin and Nill Collective say in the lawsuit that Miami induces an inappropriately induced footballer

Federal judge blocks Trump’s efforts to prevent Harvard from hosting foreign students

View the double: 15 twins who graduated from the same New York High School

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Elon Musk’s AI startup Xai will increase bond yields to 12.5% ​​with a $5 billion debt hike due to weak investor demand

Meta hires safe bipartisan executives after CEO Ilya Sutskever rejects $32 billion acquisition offer

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.