A new campaign targets WordPress administrators via a malicious plugin that displays fake browser and Java update notifications. The plugin, masquerading as "Modern Recent Posts," was found to inject malicious JavaScript only when an administrator is logged in to the wp-admin area.Â
The installed backdoor maintains access to the website even after passwords are changed.
The attack leverages social engineering by creating a sense of urgency, prompting users to "update" their software to prevent security breaches. Sucuri documented the campaign, tracing the infection vector is a sophisticated WordPress plugin that contains several malicious functions.Â
It checks the user's role, ensuring they have administrator privileges (manage_options), and verifies the User-Agent string to confirm the target is using a Windows operating system.Â
If these conditions are met, the plugin fetches a JavaScript payload from a remote command-and-control (C2) server. This script then generates the fake update overlay.Â
The malware also includes a persistence mechanism downloaded from persistancejs[.]store – which is currently detected on 28 websites. It can be remotely updated or deleted by the attacker, making it a persistent backdoor.Â
However, the primary risk from this admin dashboard malware is not to the website itself, but to the administrator's local computer. Clicking the fake update button initiates the download of an executable file, which could be ransomware, an information stealer, or a Remote Access Trojan (RAT).
To mitigate these WordPress security risks, administrators should immediately delete any unrecognized plugins. If users clicked an update prompt, the local machine should be scanned for malware.Â
Recommendations involve:
Sucuri also reported that hidden WordPress backdoors disguised as plugins created rogue admin accounts and attackers who create a hidden admin backdoor leveraging legitimate plugin elements.