Original Article Text

Click to Toggle View

WordPress plugin disguised as a security tool injects backdoor. A new malware campaign targeting WordPress sites employs a malicious plugin disguised as a security tool to trick users into installing and trusting it. According to Wordfence researchers, the malware provides attackers with persistent access, remote code execution, and JavaScript injection. At the same time, it remains hidden from the plugin dashboard to evade detection. Wordfence first discovered the malware during a site cleanup in late January 2025, where it found a modified 'wp-cron.php' file, which creates and programmatically activates a malicious plugin named 'WP-antymalwary-bot.php.' Other plugin names used in the campaign include: If the plugin is deleted, wp-cron.php re-creates and reactivates it automatically on the next site visit. Lacking server logs to help identify the exact infection chain, Wordfence hypothesizes the infection occurs via a compromised hosting account or FTP credentials. Not much is known about the perpetrators, though the researchers noted that the command and control (C2) server is located in Cyprus, and there are traits similar to a June 2024 supply chain attack. Once active on the server, the plugin performs a self-status check and then gives the attacker administrator access. "The plugin provides immediate administrator access to threat actors via the emergency_login_all_admins function," explains Wordfence in its writeup. "This function utilizes the emergency_login GET parameter in order to allow attackers to obtain administrator access to the dashboard." "If the correct cleartext password is provided, the function fetches all administrator user records from the database, picks the first one, and logs the attacker in as that user." Next, the plugin registers an unauthenticated custom REST API route that allows the insertion of arbitrary PHP code into all active theme header.php files, clearing of plugin caches, and other commands processed via a POST parameter. An updated version of the malware can also inject base64-decoded JavaScript into the site's <head> section, likely for serving visitors ads, spam, or redirecting them to unsafe sites. Apart from file-based indicators like the listed plugins, website owners should scrutinize their 'wp-cron.php' and 'header.php' files for unexpected additions or modifications. Access logs containing 'emergency_login,' 'check_plugin,' 'urlchange,' and 'key' should also serve as red flags, warranting further investigation.

Daily Brief Summary

MALWARE // Malicious WordPress Plugin Masks as Security Tool, Injects Malware

A new malware campaign targets WordPress websites using a deceptive plugin that pretends to be a security enhancement.

The crafted plugin, once installed, allows attackers persistent site access, capability to execute remote code, and JavaScript injection while avoiding detection.

Wordfence researchers discovered altered WordPress core files which autonomously recreate the malicious plugin if deleted.

The entry point for the infection is believed to be compromised hosting accounts or FTP credentials, with the exact method still unclear.

The malware provides unauthorized administrator access and can modify site contents by embedding PHP code or malicious JavaScript in site headers.

Warning signs of infection include specific changes to 'wp-cron.php' and 'header.php' files, and suspicious administrator actions traceable via access logs.

The command and control server of this malware is based in Cyprus, with operational characteristics similar to previously seen supply chain attacks.