Fake Browser Updates Target WordPress Administrators via ‘Modern Recent Posts’ Plugin

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Targeted Attack: A malicious WordPress plugin named "Modern Recent Posts" is deploying fake browser and Java update notifications.
  • Malware Delivery: The social engineering campaign aims to trick administrators on Windows machines into downloading and executing malware.
  • Stealthy Operation: The plugin injects malicious JavaScript from a remote C2 server and includes a self-update and destruction mechanism to evade detection.

A new campaign targets WordPress administrators via a malicious plugin that displays fake browser and Java update notifications. The plugin, masquerading as "Modern Recent Posts," was found to inject malicious JavaScript only when an administrator is logged in to the wp-admin area. 

The installed backdoor maintains access to the website even after passwords are changed.

Malicious Plugin Deploys Fake Updates in Admin Dashboard

The attack leverages social engineering by creating a sense of urgency, prompting users to "update" their software to prevent security breaches. Sucuri documented the campaign, tracing the infection vector is a sophisticated WordPress plugin that contains several malicious functions. 

Fake browser update warning
Fake browser update warning | Source: Sucuri

It checks the user's role, ensuring they have administrator privileges (manage_options), and verifies the User-Agent string to confirm the target is using a Windows operating system. 

If these conditions are met, the plugin fetches a JavaScript payload from a remote command-and-control (C2) server. This script then generates the fake update overlay. 

Fake Java update payload
Fake Java update payload | Source: Sucuri

The malware also includes a persistence mechanism downloaded from persistancejs[.]store – which is currently detected on 28 websites. It can be remotely updated or deleted by the attacker, making it a persistent backdoor. 

However, the primary risk from this admin dashboard malware is not to the website itself, but to the administrator's local computer. Clicking the fake update button initiates the download of an executable file, which could be ransomware, an information stealer, or a Remote Access Trojan (RAT).

Mitigating WordPress Security Risks

To mitigate these WordPress security risks, administrators should immediately delete any unrecognized plugins. If users clicked an update prompt, the local machine should be scanned for malware. 

Recommendations involve:

Sucuri also reported that hidden WordPress backdoors disguised as plugins created rogue admin accounts and attackers who create a hidden admin backdoor leveraging legitimate plugin elements.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: