The use of fake WordPress plugins installed by hackers is not a novelty, recently at Sucuri observed multiple infections aimed at installing fake plugins with backdoor capabilities.
Attackers use automated tools to create malicious WordPress plugins or by and include in their code malicious payloads such as web shells.
The researchers spotted some
The UpdraftPlus WordPress plugin has more than 2 million active installations and its contributors regularly update i
“While their code differs in terms of variable names, the malicious plugins do share a few things in common: they possess a similar structure along with header comments from the popular
“The metadata comments within these fake plugins include copies from version 1.16.16 of UpdraftPlus, which was released on July 23rd, 2019,” found researchers at web security and protection company Sucuri”
The malicious WordPress plugins hide in the WordPress dashboard and are visible only by anyone who use browsers with specific User-Agent strings that vary from plugin to plugin
The attacker could verify the presence of the malicious plugin using a GET request with custom parameters such as
The fake WordPress plugins allow attackers to establish a backdoor on the compromised sites and to provide them with access to the servers even after the original infection vector was removed.
“Malicious requests come in the form of POST parameters, which specify a remote URL for the file download locations, along with the path and name of the file to be created on the compromised server.” continues the post.
“So far, the names of these POST parameters have been unique for each plugin that we’ve analyzed.”
Post requests contain parameters such as the URL where are located the payloads to download, o
“Hackers want to maintain access to websites as long as they can. To accomplish this, they upload various
“Additionally, compromised websites may be used for malicious activity that is completely invisible from outside, including DDoS and brute-force attacks, mailing tons of spam, or cryptomining.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.