Stealthy Backdoor Tactics in WordPress Attacks
Cybercriminals are intensifying their strategies by employing stealthy backdoors camouflaged as legitimate WordPress components, thus ensuring persistent administrative access even after the discovery and obliteration of other malware.
These deceptive entities masked their perilous functions; one masqueraded as a plugin, while the other posed as a core file. Collectively, they crafted a formidable system enabling hackers to exert unfettered control over compromised websites.
In a recent examination of a breached site, two malevolent files were discovered—each pretending to be standard WordPress code yet designed to manipulate administrator accounts insidiously.
The first nefarious component was identified at ./wp-content/plugins/DebugMaster/DebugMaster.php
.
Dubbed “DebugMaster Pro,” it presented seemingly credible plugin metadata along with typical developer comments. However, its contents were profoundly obfuscated and replete with covert routines.
Upon meticulous scrutiny, this file revealed code that surreptitiously created a secret administrator user with hardcoded credentials, subsequently concealing that user by filtering queries and erasing itself from the plugin list.
The second file, ./wp-user.php
, resided at the root of the WordPress installation, appearing innocuously as another core file.
This script was more minimalist in design than its counterfeit plugin counterpart, yet equally nefarious. It perpetually monitored the existence of a specific admin user.
Should the user exist, the file would be erased and promptly recreated with the attacker’s predefined password; if not, it would simply forge it anew.
This snippet compelled WordPress to generate a new user named “help” with administrative privileges. If the user was already present, the script ensured restoration of the requisite administrator access.
Through this relentless cycle, any efforts to eliminate or alter the account were immediately counteracted.
Functional Overview of the Malware
Both files had a singular aim: to secure enduring administrative privileges for the intruders.
The splintered backdoor disguised as DebugMaster Pro established a new administrator upon activation and relayed those credentials to a remote command-and-control server.
These credentials were formatted into JSON, Base64-encoded, and dispatched via an obfuscated endpoint, allowing attackers to surveil and extract login details without raising suspicion.
Simultaneously, the wp-user.php script acted as a formidable recovery mechanism. It enforced the creation or recreation of the designated admin user with every execution, rendering manual removal an exercise in futility.
Even when site owners identified anomalous accounts and sought to delete or rename them, the script swiftly restored the attacker’s access on the subsequent page load or scheduled event.
Beyond account manipulation, the DebugMaster file injected external JavaScript into every visitor’s page, excluding administrators and specified whitelisted IP addresses.
This injected code facilitated diverse functions—redirecting traffic to malicious domains, distributing spam content, or harvesting visitor data. It also compiled IP addresses of administrators for reconnaissance, logging them locally or transmitting them back to the attackers.
Examination of the Malware
The counterfeit DebugMaster Pro plugin epitomizes the manner in which threat actors exploit social engineering and technical obfuscation.
By emulating a legitimate developer tool plugin, attackers mitigated scrutiny from site administrators who might overlook an innocuous-sounding add-on.
In tandem, these two files devised a dual-layered persistence strategy: one layer for stealth and remote surveillance, while the other enforced brute-force restoration of credentials.
The backdoor code was ensconced behind layers of Base64 encoding, complicating detection by signature-based scanners.
Its filtering hooks eliminated any trace of its existence from the WordPress dashboard, while its remote logging channel ensured real-time updates to attackers regarding new administrator accounts.

Concurrently, the wp-user.php backdoor illustrated a straightforward yet effective persistence mechanism. Rather than relying on intricate evasion methods, it guaranteed that the attacker’s selected account could never be permanently eradicated.
This brute-force methodology for account maintenance ensured that even a proficient administrator could not outpace the script without first identifying and obliterating the malignant file itself.
This hybrid technique permitted attackers to remain embedded within the WordPress site indefinitely, evading cleanup initiatives while retaining full command.
Website proprietors are strongly advised to audit all plugin directories and core files for unauthorized alterations, implement file integrity monitoring, and enforce rigorous administrative account reviews to counter these sophisticated, insidious malware campaigns.
Source link: Gbhackers.com.