Security researchers have uncovered a new wave of cyberattacks targeting WordPress websites through the exploitation of the “mu-plugins” (Must-Use plugins) directory.
This directory, designed to load plugins automatically without requiring activation, has become an attractive hiding spot for threat actors due to its low visibility in standard WordPress interfaces.
The malware embedded in this directory enables attackers to execute remote code, redirect traffic, and inject spam content, posing significant risks to website security.
Researchers identified three distinct malware variants within the mu-plugins directory:
redirect.php
file, this malware redirects site visitors to malicious external websites. By disguising itself as a legitimate update mechanism, it avoids detection by bots and administrators while targeting regular users.index.php
file. This webshell allows attackers to download and execute remote PHP scripts dynamically, granting them full control over the compromised site and enabling persistent backdoor access.custom-js-loader.php
, this malware injects spam content and manipulates website elements such as images and links. It replaces site images with explicit content and hijacks outbound links, redirecting users to malicious pop-ups or phishing pages.Administrators can identify infections through unusual site behavior, such as unauthorized redirections, unexpected file modifications, or elevated server resource usage.
According to the Report, suspicious files with misleading names in the mu-plugins directory are another red flag.
The impact of these attacks is multifaceted:
The primary infection methods include exploiting outdated plugins or themes, compromised administrator credentials, and weak server configurations.
Once inside the mu-plugins directory, the malware ensures automatic execution with WordPress, making detection challenging.
The exploitation of the mu-plugins directory underscores the evolving tactics of threat actors in embedding malware within WordPress sites.
Proactive measures such as regular security audits, updates, and robust access controls are essential to safeguard websites against such sophisticated attacks.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed that…
SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides San…
Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow attackers…
The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux kernel…
Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a sophisticated…
A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European…