
A sophisticated WordPress backdoor malware campaign ensures attackers maintain persistent administrative control. The malware uses layered tactics, including a fake plugin and a core file imposter, to create and protect hidden admin accounts, posing a significant security risk to website owners.
Security analysts from Sucuri identified two primary malicious files. The first, disguised as a plugin named "DebugMaster Pro," contained heavily obfuscated code. Its primary function was to create a new administrator account with hardcoded credentials.Â
To evade detection, the malware included functions to hide itself from the WordPress plugin list and conceal the newly created admin user from the user list.Â
This backdoor also communicated with a command and control (C2) server, exfiltrating the credentials of the new admin account along with the site’s IP address.
The second malicious file, wp-user.php, was placed in the root directory to masquerade as a legitimate core file. This script was more direct, designed to ensure a specific administrator account always existed.Â
If a site owner discovered and deleted the rogue user, the script would automatically recreate it on the next page load, creating a persistent and frustrating security loophole.
The combination of a stealthy plugin and a resilient regeneration script creates a robust backdoor system. This allows attackers to reinfect a site, inject spam, redirect visitors, or exfiltrate sensitive data at will, even after partial cleanup attempts.
To protect against this malware, administrators should immediately delete suspicious files like DebugMaster.php and wp-user.php. It is crucial to conduct a full audit of all user accounts and remove any unrecognized administrators. Following this, all WordPress, FTP, and database passwords must be reset.Â
Keeping WordPress core, themes, and plugins updated is essential for patching vulnerabilities that allow such malware to be injected in the first place.
In June, a fake WordPress plugin, named php-ini.php, was used to create a backdoor via a hidden admin user account.