Bitdefender Discovers Concealed WordPress Backdoors Establishing Admin Accounts

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Security researchers have identified an alarming pair of backdoors embedded within compromised WordPress sites, strategically designed to forge unauthorized administrator accounts.

This intrusion not only facilitates persistent access for attackers but also complicates remediation efforts, even after web administrators attempt to rectify the situation, as elucidated by Sucuri researchers.

Disguised as Legitimate Files

The first backdoor, dubbed *DebugMaster Pro*, masquerades as a legitimate debugging utility. Its insidious code is crafted to establish covert administrator accounts with preset credentials, simultaneously siphoning sensitive information to a remote command-and-control server.

To elude detection, the plugin cleverly expunges itself from standard WordPress plugin listings. Only through meticulous filtering by web administrators can the creation of these clandestine admin accounts be unveiled.

The second backdoor, *wp-user.php*, appears deceptively simplistic. However, this script is adept at autonomously generating users with administrator rights. Should the site owner attempt to eliminate this rogue account, the backdoor instantaneously resurrects it upon the next script execution.

How the Backdoors Operated

Upon installation, the backdoors proceeded to fabricate new administrator accounts and extract login credentials, including usernames, passwords, and the server’s IP addresses. This sensitive data, encoded in JSON format and obfuscated via base64, is transmitted to an external command-and-control server.

Moreover, the malware injects external scripts into the compromised websites, ensuring they are executed for all visitors, except for administrators or whitelisted IP addresses. This allows attackers to deploy harmful payloads or surveil user interactions.

icon

Conversely, *wp-user.php* guarantees its own persistence by mandating the existence of a specified administrator account. Even if administrators alter the password or attempt deletion, the script will promptly restore the account.

Signs of Compromise

WordPress site proprietors should remain vigilant for the following indicators:

  • Unfamiliar plugins or suspicious files such as DebugMaster.php or wp-user.php.
  • Unexpected administrator accounts are appearing within the user management interface.
  • Deleted accounts re-emerge shortly after their removal.

To recuperate from such intrusive compromises, security experts recommend adhering to these guidelines:

  • Remove malicious files: Eradicate *DebugMaster* and *wp-user.php* from the server.
  • Audit users: Eliminate the hardcoded “help” administrator account along with any other dubious entries.
  • Reset credentials: Update all passwords related to WordPress, FTP, hosting, and databases.
  • Update software: Ensure WordPress, plugins, and themes are operated on their latest versions to mitigate vulnerabilities.
  • Monitor outgoing traffic: Scrutinize server logs for anomalies connected to unknown domains.

Source link: Bitdefender.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading