Risk actors are utilizing the “mu-plugins” listing in WordPress websites to hide malicious code with the purpose of sustaining persistent distant entry and redirecting web site guests to bogus websites.
mu-plugins, quick for must-use plugins, refers to plugins in a particular listing (“wp-content/mu-plugins”) which might be mechanically executed by WordPress with out the necessity to allow them explicitly by way of the admin dashboard. This additionally makes the listing a really perfect location for staging malware.
“This method represents a regarding development, because the mu-plugins (Should-Use plugins) usually are not listed in the usual WordPress plugin interface, making them much less noticeable and simpler for customers to disregard throughout routine safety checks,” Sucuri researcher Puja Srivastava mentioned in an evaluation.
Within the incidents analyzed by the web site safety firm, three completely different sorts of rogue PHP code have been found within the listing –
- “wp-content/mu-plugins/redirect.php,” which redirects web site guests to an exterior malicious web site
- “wp-content/mu-plugins/index.php,” which gives internet shell-like performance, letting attackers execute arbitrary code by downloading a distant PHP script hosted on GitHub
- “wp-content/mu-plugins/custom-js-loader.php,” which injects undesirable spam onto the contaminated web site, probably with an intent to advertise scams or manipulate web optimization rankings, by changing all photos on the positioning with express content material and hijacking outbound hyperlinks to malicious websites
The “redirect.php,” Sucuri mentioned, masquerades as an online browser replace to deceive victims into putting in malware that may steal information or drop extra payloads.
“The script features a perform that identifies whether or not the present customer is a bot,” Srivastava defined. “This permits the script to exclude search engine crawlers and forestall them from detecting the redirection conduct.”
The event comes as menace actors are persevering with to make use of contaminated WordPress websites as staging grounds to trick web site guests into operating malicious PowerShell instructions on their Home windows computer systems underneath the guise of a Google reCAPTCHA or Cloudflare CAPTCHA verification – a prevalent tactic referred to as ClickFix – and ship the Lumma Stealer malware.

Hacked WordPress websites are additionally getting used to deploy malicious JavaScript that may redirect guests to undesirable third-party domains or act as a skimmer to siphon monetary info entered on checkout pages.
It is at the moment not recognized how the websites could have been breached, however the traditional suspects are susceptible plugins or themes, compromised admin credentials, and server misconfigurations.
In response to a brand new report from Patchstack, menace actors have routinely exploited 4 completely different safety vulnerabilities for the reason that begin of the 12 months –
- CVE-2024-27956 (CVSS rating: 9.9) – An unauthenticated arbitrary SQL execution vulnerability in WordPress Computerized Plugin – AI content material generator and auto poster plugin
- CVE- 2024-25600 (CVSS rating: 10.0) – An unauthenticated distant code execution vulnerability in Bricks theme
- CVE-2024-8353 (CVSS rating: 10.0) – An unauthenticated PHP object injection to distant code execution vulnerability in GiveWP plugin
- CVE-2024-4345 (CVSS rating: 10.0) – An unauthenticated arbitrary file add vulnerability in Startklar Elementor Addons for WordPress
To mitigate the dangers posed by these threats, it is important that WordPress web site homeowners maintain plugins and themes updated, routinely audit code for the presence of malware, implement robust passwords, and deploy an online utility firewall to malicious requests and forestall code injections.