Hackers Use Covert Malware to Access Admin Controls on WordPress Websites

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Stealthy Backdoor Tactics in WordPress Attacks

Cybercriminals are intensifying their strategies by employing stealthy backdoors camouflaged as legitimate WordPress components, thus ensuring persistent administrative access even after the discovery and obliteration of other malware.

These deceptive entities masked their perilous functions; one masqueraded as a plugin, while the other posed as a core file. Collectively, they crafted a formidable system enabling hackers to exert unfettered control over compromised websites.

In a recent examination of a breached site, two malevolent files were discovered—each pretending to be standard WordPress code yet designed to manipulate administrator accounts insidiously.

The first nefarious component was identified at ./wp-content/plugins/DebugMaster/DebugMaster.php.

Dubbed “DebugMaster Pro,” it presented seemingly credible plugin metadata along with typical developer comments. However, its contents were profoundly obfuscated and replete with covert routines.

Upon meticulous scrutiny, this file revealed code that surreptitiously created a secret administrator user with hardcoded credentials, subsequently concealing that user by filtering queries and erasing itself from the plugin list.

The second file, ./wp-user.php, resided at the root of the WordPress installation, appearing innocuously as another core file.

This script was more minimalist in design than its counterfeit plugin counterpart, yet equally nefarious. It perpetually monitored the existence of a specific admin user.

Should the user exist, the file would be erased and promptly recreated with the attacker’s predefined password; if not, it would simply forge it anew.

This snippet compelled WordPress to generate a new user named “help” with administrative privileges. If the user was already present, the script ensured restoration of the requisite administrator access.

Through this relentless cycle, any efforts to eliminate or alter the account were immediately counteracted.

Functional Overview of the Malware

Both files had a singular aim: to secure enduring administrative privileges for the intruders.

The splintered backdoor disguised as DebugMaster Pro established a new administrator upon activation and relayed those credentials to a remote command-and-control server.

These credentials were formatted into JSON, Base64-encoded, and dispatched via an obfuscated endpoint, allowing attackers to surveil and extract login details without raising suspicion.

Simultaneously, the wp-user.php script acted as a formidable recovery mechanism. It enforced the creation or recreation of the designated admin user with every execution, rendering manual removal an exercise in futility.

Even when site owners identified anomalous accounts and sought to delete or rename them, the script swiftly restored the attacker’s access on the subsequent page load or scheduled event.

Beyond account manipulation, the DebugMaster file injected external JavaScript into every visitor’s page, excluding administrators and specified whitelisted IP addresses.

This injected code facilitated diverse functions—redirecting traffic to malicious domains, distributing spam content, or harvesting visitor data. It also compiled IP addresses of administrators for reconnaissance, logging them locally or transmitting them back to the attackers.

Examination of the Malware

The counterfeit DebugMaster Pro plugin epitomizes the manner in which threat actors exploit social engineering and technical obfuscation.

By emulating a legitimate developer tool plugin, attackers mitigated scrutiny from site administrators who might overlook an innocuous-sounding add-on.

In tandem, these two files devised a dual-layered persistence strategy: one layer for stealth and remote surveillance, while the other enforced brute-force restoration of credentials.

The backdoor code was ensconced behind layers of Base64 encoding, complicating detection by signature-based scanners.

Its filtering hooks eliminated any trace of its existence from the WordPress dashboard, while its remote logging channel ensured real-time updates to attackers regarding new administrator accounts.

Close-up of the WordPress app download page on a tablet, showing its logo, rating, and a blue cloud icon.

Concurrently, the wp-user.php backdoor illustrated a straightforward yet effective persistence mechanism. Rather than relying on intricate evasion methods, it guaranteed that the attacker’s selected account could never be permanently eradicated.

This brute-force methodology for account maintenance ensured that even a proficient administrator could not outpace the script without first identifying and obliterating the malignant file itself.

This hybrid technique permitted attackers to remain embedded within the WordPress site indefinitely, evading cleanup initiatives while retaining full command.

Website proprietors are strongly advised to audit all plugin directories and core files for unauthorized alterations, implement file integrity monitoring, and enforce rigorous administrative account reviews to counter these sophisticated, insidious malware campaigns.

Source link: Gbhackers.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading