A sophisticated malware campaign has recently been uncovered by security researchers at Sucuri, targeting WordPress websites through hidden malware and backdoors in the mu-plugins directory. This campaign shows the importance of continuous WordPress security hardening, including disabling unused directories and conducting real-time malware scans, as 68% of infections stem from outdated components. A newly discovered malware campaign is compromising WordPress websites through credential stuffing and phishing attacks, leading to backdoor installations in the mu-plugins directory with encrypted payloads. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. To mitigate this risk, website owners should enforce file integrity monitoring by blocking PHP execution in upload directories, reset all admin, FTP, and database credentials, and implement web application firewalls with mu-plugins monitoring. This attack chain allows remote execution of malicious code, enabling full server compromise, data theft, and persistent control over infected sites. Tushar is a Cyber security content editor with a passion for creating captivating and informative content.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 17 Feb 2025 12:25:05 +0000