Menace actors are utilizing the “mu-plugins” listing in WordPress websites to hide malicious code with the aim of sustaining persistent distant entry and redirecting web site guests to bogus websites.
mu-plugins, quick for must-use plugins, refers to plugins in a particular listing (“wp-content/mu-plugins”) which can be routinely executed by WordPress with out the necessity to allow them explicitly by way of the admin dashboard. This additionally makes the listing an excellent location for staging malware.
“This strategy represents a regarding development, because the mu-plugins (Should-Use plugins) are usually not listed in the usual WordPress plugin interface, making them much less noticeable and simpler for customers to disregard throughout routine safety checks,” Sucuri researcher Puja Srivastava stated in an evaluation.
Within the incidents analyzed by the web site safety firm, three totally different sorts of rogue PHP code have been found within the listing –
- “wp-content/mu-plugins/redirect.php,” which redirects web site guests to an exterior malicious web site
- “wp-content/mu-plugins/index.php,” which affords net shell-like performance, letting attackers execute arbitrary code by downloading a distant PHP script hosted on GitHub
- “wp-content/mu-plugins/custom-js-loader.php,” which injects undesirable spam onto the contaminated web site, seemingly with an intent to advertise scams or manipulate search engine optimization rankings, by changing all photographs on the location with express content material and hijacking outbound hyperlinks to malicious websites
The “redirect.php,” Sucuri stated, masquerades as an online browser replace to deceive victims into putting in malware that may steal knowledge or drop further payloads.
“The script features a perform that identifies whether or not the present customer is a bot,” Srivastava defined. “This permits the script to exclude search engine crawlers and forestall them from detecting the redirection conduct.”
The event comes as risk actors are persevering with to make use of contaminated WordPress websites as staging grounds to trick web site guests into working malicious PowerShell instructions on their Home windows computer systems beneath the guise of a Google reCAPTCHA or Cloudflare CAPTCHA verification – a prevalent tactic referred to as ClickFix – and ship the Lumma Stealer malware.

Hacked WordPress websites are additionally getting used to deploy malicious JavaScript that may redirect guests to undesirable third-party domains or act as a skimmer to siphon monetary info entered on checkout pages.
It is at present not recognized how the websites might have been breached, however the typical suspects are susceptible plugins or themes, compromised admin credentials, and server misconfigurations.
In line with a brand new report from Patchstack, risk actors have routinely exploited 4 totally different safety vulnerabilities because the begin of the yr –
- CVE-2024-27956 (CVSS rating: 9.9) – An unauthenticated arbitrary SQL execution vulnerability in WordPress Automated Plugin – AI content material generator and auto poster plugin
- CVE- 2024-25600 (CVSS rating: 10.0) – An unauthenticated distant code execution vulnerability in Bricks theme
- CVE-2024-8353 (CVSS rating: 10.0) – An unauthenticated PHP object injection to distant code execution vulnerability in GiveWP plugin
- CVE-2024-4345 (CVSS rating: 10.0) – An unauthenticated arbitrary file add vulnerability in Startklar Elementor Addons for WordPress
To mitigate the dangers posed by these threats, it is important that WordPress web site homeowners maintain plugins and themes updated, routinely audit code for the presence of malware, implement robust passwords, and deploy an online software firewall to malicious requests and forestall code injections.