Connect with us

cybersecurity

Malware gains persistence by mimicking WordPress security plugin

Security researchers at Wordfence have identified a new, sophisticated malware strain masquerading as a legitimate WordPress security plugin, according to a report by Cybersecurity News.

Disguised under names such as WP-antymalwary-bot.php and wp-performance-booster.php, the malicious plugin provides attackers with covert, ongoing access to infected websites. Its functions include remote code execution, administrator privilege escalation, malicious JavaScript injection, and communication with a command-and-control server based in Cyprus. The malware transmits the compromised sites URL and timestamp every minute, allowing threat actors to maintain a real-time list of active infections. Initially discovered during a site cleanup on January 22, 2025, the malware was noted for mimicking the structure of legitimate plugins. It maintains persistence by altering the WordPress wp-cron.php file, which automatically reinstalls the malicious plugin if it is removed. It also avoids detection by hiding itself from the dashboard and includes an emergency login mechanism that uses a predefined password to hijack the first administrator account it identifies.

 

Source: Malware gains persistence by mimicking WordPress security plugin

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Copyright © 2022 Inventrium Magazine

%d bloggers like this: