Article Details

Original Article Text

Click to Toggle View

Hackers abuse WordPress MU-Plugins to hide malicious code. Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection. The technique was first observed by security researchers at Sucuri in February 2025, but adoption rates are on the rise, with threat actors now utilizing the folder to run three distinct types of malicious code. "The fact that we've seen so many infections inside mu-plugins suggests that attackers are actively targeting this directory as a persistent foothold," explains Sucuri's security analyst Puja Srivastava. "Must-have" malware Must-Use Plugins (mu-plugins) are a special type of WordPress plugin that automatically execute on every page load without needing to be activated in the admin dashboard. They are PHP files stored in the 'wp-content/mu-plugins/' directory that automatically execute when the page is loaded, and they are not listed in the regular "Plugins" admin page unless the "Must-Use" filter is checked. Mu-plugins have legitimate use cases such as enforcing site-wide functionality for custom security rules, performance tweaks, and dynamically modifying variables or other code. However, because MU-plugins run on every page load and don't appear in the standard plugin list, they can be used to stealthily perform a wide range of malicious activity, such as stealing credentials, injecting malicious code, or altering HTML output. Sucuri has discovered three payloads that attackers are planting in the mu-plugins directory, which appears to be part of financially motivated operations. These are summarized as follows: The webshell case is particularly dangerous as it allows the attackers to remotely execute commands on the server, steal data, and launch downstream attacks on members/visitors. The other two payloads can also be damaging as they hurt a site's reputation and SEO scores due to shady redirections and attempt to install malware on visitor's computers. Sucuri has not determined the exact infection pathway but hypothesizes that attackers exploit known vulnerabilities on plugins and themes or weak admin account credentials. It is recommended that WordPress site admins apply security updates on their plugins and themes, disable or uninstall those that aren't needed, and protect privileged accounts with strong credentials and multi-factor authentication. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Rising Abuse of WordPress MU-Plugins by Hackers Uncovered

Hackers are increasingly exploiting the WordPress mu-plugins directory to secretly inject malicious code into websites.

Security firm Sucuri first identified the technique in February 2025, which involves executing malware on every page load without standard plugin activation.

Three main types of malicious payloads were discovered in the mu-plugins directory, aimed at data theft, website redirection, and harmful code injections.

The misuse of mu-plugins allows hackers to maintain a persistent presence on the site, complicating detection and removal efforts.

Such attacks typically leverage vulnerabilities in existing plugins/themes or exploit weak admin credentials.

Sucuri recommends regular updates to themes and plugins, deactivation of unnecessary extensions, and the strengthening of admin accounts with robust passwords and multi-factor authentication.

The phenomenon underscores a growing trend of cybercriminals targeting core functionalities of popular content management systems like WordPress for financial gain.