Hidden Backdoor In WordPress Plugins Grants Attackers Ongoing Access To Websites - Cybernoz - Cybersecurity News
5 Articles
5 Articles


Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access
Cybersecurity researchers have uncovered a new stealthy backdoor concealed within the "mu-plugins" directory in WordPress sites to grant threat actors persistent access and allow them to perform arbitrary actions. Must-use plugins (aka mu-plugins) are special plugins that are automatically activated on all WordPress sites in the installation. They are located in the "wp-content/mu-plugins"
Hidden Backdoor In WordPress Plugins Grants Attackers Ongoing Access To Websites - Cybernoz - Cybersecurity News
Security researchers have discovered a concerning trend in which a highly skilled malware campaign has been targeting WordPress websites by using the frequently disregarded mu-plugins directory to insert a covert backdoor. This directory, short for “must-use plugins,” houses automatically activated plugins that cannot be deactivated through the standard WordPress admin interface, making it an ideal hiding spot for persistent threats. The malware…
Hidden Backdoor in WordPress Plugins Grants Attackers Ongoing Access to Websites
Security researchers have discovered a concerning trend in which a highly skilled malware campaign has been targeting WordPress websites by using the frequently disregarded mu-plugins directory to insert a covert backdoor. This directory, short for “must-use plugins,” houses automatically activated plugins that cannot be deactivated through the standard WordPress admin interface, making it an ideal […] The post Hidden Backdoor in WordPress Plugi…
Coverage Details
Bias Distribution
- 100% of the sources lean Right
Factuality
To view factuality data please Upgrade to Premium