Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

36,000 Sites Hit by Backdoored Plugins

June 24, 2024
Reading Time: 2 mins read
in Alerts
36,000 Sites Hit by Backdoored Plugins

Security researchers have discovered a significant supply-chain attack affecting around 36,000 WordPress websites. The attack involves five plugins that have been compromised with backdoors, allowing attackers to gain administrative control over the affected sites. The malicious updates, available on WordPress.org, not only create attacker-controlled admin accounts but also inject content aimed at manipulating search engine results.

The compromised plugins include Social Warfare, BLAZE Retail Widget, Wrapper Link Elementor, Contact Form 7 Multi-Step Addon, and Simply Show Hooks. The malicious code, while not highly sophisticated, was injected into plugin updates as recently as June 21, 2024. The code facilitates unauthorized access and adds SEO spam to websites, exploiting the trusted update mechanism of WordPress plugins.

The attackers’ methods are indicative of a broader trend in supply-chain attacks, where malware is introduced at the source, affecting numerous systems upon legitimate software updates. This attack mirrors past incidents where vulnerabilities in widely used code libraries have led to widespread infection. The ongoing investigation aims to understand how the plugins were compromised and to prevent further breaches.

Website administrators are advised to immediately uninstall the affected plugins and check their sites for unauthorized administrative accounts and malicious content. Tools like the Wordfence Vulnerability Scanner can help identify if any of the compromised plugins are in use and detect suspicious connections and admin accounts.

Reference:

  • 36,000 WordPress Sites Hit by Backdoored Plugins in Latest Supply-Chain Attack
Tags: BLAZE Retail WidgetCyber AlertsCyber Alerts 2024Cyber threatsJune 2024Social Warfaresupply chainWordpressWordpress pluginWrapper Link Elementor
ADVERTISEMENT

Related Posts

Wing FTP Server RCE Flaw Exploited

WinRAR Zero-Day Exploit $80K on Dark Web

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Google Gemini Flaw Hijacks Email Summaries

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Wing FTP Server RCE Flaw Exploited

July 14, 2025
Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025

Latest Alerts

WinRAR Zero-Day Exploit $80K on Dark Web

Google Gemini Flaw Hijacks Email Summaries

Wing FTP Server RCE Flaw Exploited

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

Subscribe to our newsletter

    Latest Incidents

    Supermarket Cyberattack Prompts Warning

    China Hacker Suspected in DC Law Firm Breach

    nius.de Cyberattack Leaks User Data

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial