• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover malware posing as wordpress caching plugin

Researchers Uncover Malware Posing as WordPress Caching Plugin

You are here: Home / General Cyber Security News / Researchers Uncover Malware Posing as WordPress Caching Plugin
October 12, 2023

Cybersecurity scientists have get rid of light on a new sophisticated pressure of malware that masquerades a WordPress plugin to stealthily generate administrator accounts and remotely command a compromised site.

“Comprehensive with a qualified looking opening remark implying it is a caching plugin, this rogue code includes various functions, adds filters to avoid alone from becoming bundled in the record of activated plugins, and has pinging features that lets a malicious actor to check out if the script is continue to operational, as very well as file modification capabilities,” Wordfence claimed.

The plugin also features the ability to activate and deactivate arbitrary plugins on the web page remotely as very well as generate rogue admin accounts with the username superadmin and a really hard-coded password.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In what’s observed as an attempt to erase traces of compromise, it features a functionality named “_pln_cmd_conceal” which is made to get rid of the superadmin account when it can be no for a longer time essential.

Cybersecurity

Some of the other noteworthy functions of the malware consist of the potential to remotely activate several malicious functions, change posts and web site content and inject spam back links or buttons, and result in lookup motor crawlers to index doubtful written content so as to redirect web page people to sketchy web sites.

“Taken together, these features supply attackers with everything they will need to remotely command and monetize a sufferer website, at the cost of the site’s have Search engine optimisation rankings and user privacy,” researcher Marco Wotschka stated.

WordPress Caching Plugin

“Remote plugin activation and admin user generation and deletion as very well as conditional information filtering let this backdoor to evade simple detection by the inexperienced consumer.”

The scale of the attacks and the actual preliminary intrusion vector utilized to breach the internet sites are at this time unfamiliar.

The disclosure arrives as Sucuri exposed that much more than 17,000 WordPress websites have been compromised in the month of September 2023 with Balada Injector malware to increase destructive plugins and develop rogue weblog administrators.

Observed this post intriguing? Adhere to us on Twitter  and LinkedIn to read extra exclusive information we post.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «researchers uncover ongoing attacks targeting asian governments and telecom giants Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants
Next Post: Microsoft Defender Thwarts Large-Scale Akira Ransomware Attack microsoft defender thwarts large scale akira ransomware attack»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.