Contact Info

Atlas Cloud LLC 600 Cleveland Street Suite 348 Clearwater, FL 33755 USA

support@dedirock.com

Client Area
Recommended Services
Supported Scripts
WordPress
Hubspot
Joomla
Drupal
Wix
Shopify
Magento
Typeo3

Cybersecurity researchers have recently uncovered a new campaign aimed at WordPress sites, wherein malware masquerades as a security plugin, specifically named "WP-antymalwary-bot.php." This malicious plugin boasts features designed to provide ongoing access, conceal itself from site administrators, and execute remote code.

Marco Wotschka from Wordfence reported that this plugin includes functions for communicating with a command-and-control server and contains code that enables the spreading of malware to other directories, as well as injecting malicious JavaScript for the purpose of serving ads. Since its initial discovery during a site cleanup in late January 2025, it has been found active with various variants circulating online under multiple names, including addons.php, wpconsole.php, and wp-performance-booster.php.

Upon installation and activation, the plugin grants hackers full administrator access to the dashboard and utilizes REST API to facilitate remote code execution by embedding harmful PHP code into the theme’s header file or purging caches of popular caching plugins.

In a concerning evolution of this malware, the latest versions implement advanced methods for conducting code injections, such as retrieving JavaScript from compromised external domains to deliver ads or spam. Additionally, it is accompanied by a harmful wp-cron.php file that can recreate and reactivate the malware upon the next site visit if it has been removed.

At present, the specific methods used to breach these sites remain unclear, as do the identities of the attackers. However, the presence of comments and messages in the Russian language suggests that the perpetrators may be Russian-speaking individuals.

This disclosure has occurred alongside reports from Sucuri, which highlighted a separate web skimming campaign utilizing a counterfeit fonts domain called "italicfonts.org" to trick users into entering their payment information on checkout pages. Another report detailed a multi-stage attack targeting Magento e-commerce platforms, where attackers injected JavaScript malware designed to exfiltrate sensitive data like credit card details and login credentials.

Adding further complexity to the threat landscape, malicious actors have been seen embedding Google AdSense code into at least 17 WordPress sites with the intent to hijack ad revenue. These attackers exploit the site’s resources to serve their ads and potentially profit from any ad revenue that the site owner would typically earn.

Moreover, deceptive CAPTCHA verifications on compromised websites have led users to inadvertently download and execute Node.js-based backdoors. These backdoors collect system information, enable remote access, and deploy a Node.js remote access Trojan (RAT) that tunnels malicious traffic through SOCKS5 proxies.

Trustwave SpiderLabs attributed this activity to a traffic distribution system (TDS) known as Kongtuke, referring to it by various aliases. The dropped JavaScript is capable of multi-functional backdoor operations, including detailed system reconnaissance and executing remote commands, thus ensuring continued covert access to compromised systems.


Welcome to DediRock, your trusted partner in high-performance hosting solutions. At DediRock, we specialize in providing dedicated servers, VPS hosting, and cloud services tailored to meet the unique needs of businesses and individuals alike. Our mission is to deliver reliable, scalable, and secure hosting solutions that empower our clients to achieve their digital goals. With a commitment to exceptional customer support, cutting-edge technology, and robust infrastructure, DediRock stands out as a leader in the hosting industry. Join us and experience the difference that dedicated service and unwavering reliability can make for your online presence. Launch our website.

Share this Post
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x