Fake WordPress Plugin Comes with Cryptocurrency Mining Function

Malicious plugins for WordPress websites are being used not just to maintain access on the compromised server but also to mine for cryptocurrency.

- Advertisement -

Researchers at website security company Sucuri noticed the number of malicious plugins increase over the past months. The components are clones of legitimate software, altered for nefarious purposes.

Normally, these fake plugins are used to give attackers access to the server even after the infection vector is removed. But they can include code for other purposes, too, such as encrypting content on a blog.

Double hedging

One of the plugins discovered by Sucuri to have a double purpose is a clone of “wpframework.” It was found in September and attackers used it to “gain and maintain unauthorized access to the site environment,” the researchers say.

It is unclear which plugin it impersonates, but one with this name exists in the WordPress public repository but its development seems to have stopped in 2011. Despite this, it still has more than 400 active installations.

- Advertisement -

Apart from scanning for functions that allow command execution at the server level and restricting this privilege to the botmaster, the plugin also carried code to run a Linux binary that mines for cryptocurrency.

When the researchers checked the referenced domain hosting the binary it was no longer active. However, the backdoor functionality of the component was still present.

The mining component was added to the Virus Total antivirus scanning platform on September 18 and is currently detected by 25 out of 56 engines.

Generating malicious plugins

Although Sucuri does not provide details about the reason for the increased frequency of malicious plugins, it is worth noting that creating them is far from being an effort.

Instead of creating a malicious WordPress plugin from scratch, attackers can modify the code of an existing one to include malicious components.

Additionally, automated tools exist that can generate a plugin with a name given by the attacker and lace it with an arbitrary payload, such as a reverse shell.

Furthermore, the web offers the necessary tutorial for low-skilled attackers to learn how to create these fake website components.

Sucuri advises webmasters to also check the additional site components when doing a malware cleanup since many times this procedure is limited to WordPress core files. Themes and plugins are often migrated without any prior scrutiny. This way, attackers maintain their grip on the new site through the backdoor planted in third-party extensions.

Source

Previous Articles:

- Advertisement -

Latest News

Wisconsin Bill Proposes Crypto Mining, Staking License Exemptions

Wisconsin lawmakers propose a bill to exempt individuals and businesses from money transmitter licenses...

Dormant Bitcoin Whale Moves $44M After 12 Years, Spooking Market

An inactive Bitcoin wallet holding 400 BTC, valued at over $44 million, moved funds...

Nvidia Stock Jumps as $100B OpenAI Investment Talks Fuel Optimism

NVIDIA stock rose 2% after recent losses, as several other AI-related stocks also saw...

Turkey Plans Law Allowing Watchdog to Freeze Crypto Accounts

Turkey plans to give its financial watchdog, Masak, power to freeze both bank and...

Intel Stock Surges as Apple, Nvidia Talks Fuel Bullish Analyst Targets

Intel shares surged 20% last week after reports of possible investments from major tech...
- Advertisement -

Must Read

10 Best Crypto to Mine Without Special Hardware Equipment

A lot of people mostly think that it takes a difficult process to mine cryptocurrency. today we are going to show you some of...