Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers operate MU-Plagins WordPress to introduce spam and refund site images
Global Security

Hackers operate MU-Plagins WordPress to introduce spam and refund site images

AdminBy AdminMarch 31, 2025No Comments3 Mins Read
Hackers Exploit WordPress
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 31, 2025Red LakshmananData steal / web safety

Hackers operate WordPress

The threatening actors use the MU-planning catalog on WordPress websites to hide the malicious code to maintain permanent remote access and redirect site visitors to fake sites.

Mu-meline shortened for Required plugsrefers to plugins in a special directory (“WP-Content/Mu-Plugins”), which are automatically performed by WordPress without having to turn them clearly through the administrator’s dashboard. It also makes the catalog the perfect place for malware.

“This approach is a tendency because the MU-Plane (the plugin of the compulsory use) is not made in the standard WordPress plugin interface, making them less noticeable and easier to ignore during the usual security checks,”-Puja Susour Susour Srivastava – Note In the analysis.

Cybersecurity

In the incidents analyzed by the site security company, three different types of PHP Rogue PHP –

  • “WP-Content/Mu-Plugins/Refirect.php”, which redirects site visitors to external harmful site
  • “WP-Content/Mu-Plugins/Index.php”, which offers a functionality similar to a web barrel Located on GitHub
  • “WP-Content/Mu-Plugins/Custom-js- Loader.php”, which introduces an unwanted spam on the infected website, probably to promote scrap or manipulate SEO ratings by replacing all the images on the obvious content and stealing the weekend links to the malicious sites

“Redirect.php,” Sukur said, disguised as an update web browser to trick the victims to install malicious software that can steal data or give up additional useful loads.

“The scenario includes a function that determines whether the current visitor is a bot,” Schrevostava explained. “This allows the scripts to exclude the search engine expanses and prevent them from detecting redirect behavior.”

Development comes when there is a threat continuation relate infected WordPress sites As a base for deception of the site visitors to execute malicious PowerShell commands on their Windows computers under the guise of Google Recaptcha or Cloudflare CAPTCHA Verification – A – A – A – A – A – A – A – A – A – A – A – A – A – A – common tactics called Clickfix – And deliver malicious software for theft of Lumma.

Hackers operate WordPress

Also used hacked WordPress sites Redirect visitors to unwanted third domains either act like a skimer For the siphon financial information was introduced on the pages of the box office.

Currently, it is unknown how the sites may be broken, but ordinary suspects are vulnerable plugins or topics, violated administrator credentials and the wrong server configurations.

Cybersecurity

According to the new Patchstack report, the threatening subjects regularly exploited Four different security vulnerabilities since the beginning of the year –

  • CVE -2024-27956 (CVSS Assessment: 9.9) – Invalid arbitrary vulnerability of SQL in Automatic Plugin WordPress – AI content generator and automatic poster plugin
  • CVE- 2024-25600 (CVSS Assessment: 10.0)- Invalid Vulneration of the Remote Code in Brick
  • CVE-2024-8353 (CVSS Assessment: 10.0) —NeSauted PHP facility for remote vulnerability code in Givewp plugins
  • CE-2024-4345 (CVSS Assessment: 10.0) -Nid arbitrary vulnerability file in Adlynor Addons Addons for WordPress for WordPress

To mitigate the risks provided by these threats, it is important that WordPress owners support plugins and topics, regularly auditing the code for malware, retain strong passwords and deploy the web supplies for malicious requests and prevent code injections.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.