Hackers Compromise WordPress Plugins to Create Rogue Admin Accounts


Hackers Compromise WordPress Plugins to Create Rogue Admin Accounts

On June 25, 2024, Wordfence security researcher Chloe Chamberland alerted that several WordPress plugins have been compromised to inject malicious code, enabling the creation of rogue administrator accounts for performing arbitrary actions.

via GIPHY

The injected malware creates new administrative user accounts and sends the account details to an attacker-controlled server. Additionally, malicious JavaScript has been injected into the footer of affected websites, spreading SEO spam throughout.

The rogue admin accounts are created with the usernames “Options” and “PluginAuth,” and the account information is sent to the IP address 94.156.79(.)8.

The method used by the attackers to compromise the plugins remains unknown. The earliest signs of this software supply chain attack date back to June 21, 2024.

The compromised plugins have been removed from the WordPress plugin directory pending review:

Users of these plugins are advised to check their sites for suspicious administrator accounts and delete them, as well as remove any malicious code.

Protect Your WordPress Site From Vulnerabilities With SafeUpdates

SafeUpdates automatically handles core updates, plugins, and themes, shielding you from WordPress plugin vulnerabilities.

Start Growing with Cloudways Today.

Our Clients Love us because we never compromise on these

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He’s also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Thankyou for Subscribing Us!

Do you like what you read?

Thank you for your feedback!





Voir le meilleur hébergeur