Description
A sophisticated malware campaign is targeting WordPress websites using a malicious plugin masquerading as a security tool. Discovered by Wordfence researchers during a routine site cleanup in January 2025, the campaign allows attackers to gain persistent administrative access, execute remote code, and inject JavaScript payloads. The malicious plugin remains invisible in the plugin dashboard, increasing the likelihood of prolonged undetected infections.
Attack Details
The initial infection vector is unclear, though Wordfence speculates the compromise likely occurs through a breached hosting account or stolen FTP credentials. Once the attackers gain access, they modify the wp-cron.php file to automatically install and activate a backdoor plugin initially named WP-antymalwary-bot.php.
The plugin performs a self-check and enables an emergency login function, which uses the emergency_login GET parameter to grant administrator access. If the correct cleartext password is provided, the script retrieves admin accounts from the database and logs the attacker in.
Further, the malware registers an unauthenticated REST API endpoint that allows:
Later variants of the malware can also inject base64-decoded JavaScript into the site’s <head> section a tactic typically used for ad injection, spam delivery, or malicious redirections. Alarmingly, if the plugin is deleted, the modified wp-cron.php file recreates and reactivates it upon the next visit to the site.
The Command and Control (C2) infrastructure for this malware has been traced to a server in Cyprus. Some elements of the code and behavior suggest a possible connection to a 2024 supply chain attack.
Remediation
Immediate Actions:
Check for Administrator Hijack:
Enhance Security:
Post-Cleanup Monitoring:
Report and Inform:
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: Malicious WordPress Plugin Disguised as Security Tool Injects Backdoor
References