Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Attackers Hide Malware in WordPress mu-Plugins

April 1, 2025
Reading Time: 2 mins read
in Alerts
Apple Warns of New Zero Day Vulnerabilities

Threat actors are increasingly exploiting the “mu-plugins” directory in WordPress to conceal malicious code and maintain persistent access. These must-use plugins, automatically loaded on every page without activation, make the directory an ideal target for attackers to hide malware. This stealthy approach avoids detection by regular security checks, as the files do not appear in the standard plugin interface, allowing them to evade common security scans. Researchers have discovered several types of malicious PHP code being deployed, such as “redirect.php,” “index.php,” and “custom-js-loader.php,” which cause significant harm to infected websites.

The “redirect.php” file is used to send visitors to malicious websites, often under the guise of a system update.

This redirection targets regular users while avoiding bots and administrators to remain undetected. “Index.php,” on the other hand, acts as a web shell that grants attackers remote access, allowing them to execute arbitrary code from external servers. This gives attackers control over the site, enabling further malware deployment or data theft. Meanwhile, “custom-js-loader.php” injects spam content, replacing legitimate images and hijacking outbound links to promote scams or manipulate SEO rankings.

These tactics reflect a broader strategy by threat actors to use compromised WordPress sites as tools for fraud, data theft, and further infections.

The malware identified has various purposes, including redirecting traffic, taking control of the site, and injecting spam content. The attack aims at both financial gain and maintaining long-term access to compromised sites. The stealthy nature of the malware makes it difficult for administrators to detect without thorough security audits, which is why site owners must be vigilant in monitoring for unusual behaviors, like unexpected file modifications or elevated server usage.

The vulnerabilities that allow these attacks are often linked to weak plugins or compromised server configurations. Sucuri researchers have noted a rise in malware hidden in the mu-plugins directory and urge WordPress site owners to regularly update plugins, enforce strong passwords, and install firewalls to block malicious activities. With attackers exploiting this hidden directory for backdoors and persistence, it’s critical to adopt comprehensive security practices to prevent such breaches and limit the spread of malicious code on WordPress sites.

Reference:
  • Attackers Exploit WordPress mu-Plugins to Hide Malware and Maintain Persistent Access
Tags: April 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

FreeDrain Phishing Steals Crypto Funds

FBI Warns Cybercriminals Exploit Routers

May 9, 2025
FreeDrain Phishing Steals Crypto Funds

X Scam Targets Crypto Users with Fake Ads

May 9, 2025
FreeDrain Phishing Steals Crypto Funds

FreeDrain Phishing Steals Crypto Funds

May 9, 2025
COLDRIVER Hackers Target Sensitive Data

COLDRIVER Hackers Target Sensitive Data

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

CoGUI Targets Consumer and Finance Brands

May 8, 2025

Latest Alerts

X Scam Targets Crypto Users with Fake Ads

FBI Warns Cybercriminals Exploit Routers

FreeDrain Phishing Steals Crypto Funds

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

Subscribe to our newsletter

    Latest Incidents

    LockBit Ransomware Data Leaked After Hack

    Spanish Consumer Group Faces Cyberattack

    Education Giant Pearson Hit by Data Breach

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial