When Your “Security” Plugin is the Hacker
Source: The Hacker News |
Imagine installing a plugin that promises to protect your WordPress site, only to find out later that it left the door wide open for attackers. That’s exactly what’s been happening in a recent malware campaign where a fake WordPress security plugin is acting more like a saboteur than a shield.
Researchers have uncovered a plugin going by the name wp-antymalwary-bot.php, posing as a security solution while silently handing over admin access to threat actors. Once installed, it injects a stealthy backdoor into the site, letting attackers execute remote commands and manipulate content without raising any red flags. It’s a slick operation. Nothing shows up in the admin panel, and the plugin re-installs itself even after deletion, using a tampered wp-cron.php file as its anchor.
Under the Hood
The attackers aren’t just brute-forcing their way in, they’ve baked persistence into the plugin itself. Once active, the malware uses a function called emergency_login_all_admins, which essentially allows it to impersonate any admin account as long as the attacker knows the magic password. It even reaches into the WordPress REST API to spread malicious PHP code or clear caches that might otherwise alert users to its presence.
This is not your average amateur script. The codebase includes Russian-language comments, hinting at the likely origin of the developers. But attribution aside, it’s the level of control this plugin gives the attackers that’s most concerning. They can inject JavaScript, manipulate site content, and maintain full access long after the initial breach, all while the site owner is left in the dark.
What Site Owners Need to Know
When designing a website, especially one that relies on third-party plugins, it's time to double-check any installations made for "security" purposes. This recent exploit on WordPress highlights a broader trend in cybercrime: packaging malicious functionality inside tools that look helpful on the surface. It’s a digital Trojan Horse—and it’s catching people off guard.
Stick to plugins with strong reputations, recent updates, and a transparent changelogs. If something seems off—like a sudden drop in performance, strange site behavior, or unexpected admin logins—it’s time to investigate.
The bottom line? Security isn't just about what tools you install. It's about understanding how those tools behave and whether they're working for you, or against you.
References
[1] B. Toulas, “WordPress plugin disguised as a security tool injects backdoor,” BleepingComputer, Apr. 30, 2025. [Online]. Available: https://www.bleepingcomputer.com/news/security/wordpress-plugin-disguised-as-a-security-tool-injects-backdoor/
[2] R. Lakshmanan, “Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers,” The Hacker News, May 1, 2025. [Online]. Available: https://thehackernews.com/2025/05/fake-security-plugin-on-wordpress.html
Comments
Post a Comment