Saturday, May 24, 2025
Homecyber securityNew WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites

Published on

SIEM as a Service

Follow Us on Google News

The Wordfence Threat Intelligence team has identified a new strain of WordPress malware that masquerades as a legitimate plugin, often named ‘WP-antymalwary-bot.php.’

First detected on January 22, 2025, during a routine site cleanup, this malware exhibits advanced capabilities, enabling attackers to seize complete control over infected websites.

With features like remote code execution, hidden persistence mechanisms, and communication with a Command & Control (C&C) server, this threat poses a significant risk to WordPress site owners.

- Advertisement - Google News

Premium Wordfence users received a malware signature to detect this threat on January 27, 2025, while free users gained access on February 26, 2025.

A firewall rule was later deployed to premium users on April 23, 2025, with free users scheduled to receive it on May 23, 2025.

Technical Breakdown of the Malware’s Functionality

This malware presents itself as a benign plugin with convincing headers and code formatting, evading casual detection.

It employs multiple malicious functions, including an ’emergency_login’ feature that allows attackers to gain administrator access via a simple GET parameter, effectively bypassing standard authentication.

Additionally, it integrates a REST API endpoint for remote code execution, enabling threat actors to inject malicious PHP code into theme header files or clear caches of popular plugins without any authorization checks.

According to the Report, The malware also hides itself from the WordPress dashboard’s plugin list, making it nearly invisible to site administrators.

Persistence is maintained through a compromised ‘wp-cron.php’ file, which reinstates the malware if removed, triggered by mere site visits.

In its evolved form, spotted just days before this report, the malware schedules events to ping a C&C server in Cyprus at 45.61.136.85 every minute, reporting site details and facilitating attacker control.

It also fetches malicious JavaScript from external sources for ad-serving purposes, injecting it into site headers with sophisticated obfuscation techniques using base64 encoding.

The infection likely originates from compromised hosting accounts or FTP credentials, starting with modifications to ‘wp-cron.php’ before spreading to plugins under deceptive names like ‘addons.php’ or ‘wp-performance-booster.php.’

Indicators of compromise include requests to the C&C server, presence of ’emergency_login’ in access logs with successful responses, and tampered theme files.

This malware bears similarities to AI-generated threats seen in past supply chain attacks reported by Wordfence in June 2024, suggesting adversaries may be leveraging automation to craft more convincing malicious code.

As WordPress remains a prime target for cybercriminals, site owners are urged to deploy robust security solutions like Wordfence CLI for server-level scanning and to monitor logs for suspicious activity.

With over 4.3 million malicious samples in Wordfence’s Threat Intelligence database, their tools detect over 99% of known threats, offering critical defense-in-depth protection against such insidious malware.

Immediate action, including updating security measures and reviewing site integrity, is paramount to safeguard against this evolving digital menace.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...