Friday, September 18, 01:22
Home security "WordPress Malware" disables security plugins

"WordPress Malware" disables security plugins

We have talked to you in the past about malware that effectively "disables" security measures that have been introduced either manually by the owner or through the use of a security plugin installed in WordPress. Where attackers may encounter a problem is that a security plugin usually monitors the files and if it detects any changes, notifies the owner either via email or through the WordPress control panel.

Wordpress security plugin

Unfortunately, a "PHP malware" solves the above intruder problem by disabling the most frequently used security plugins and preventing them from reactivating from the WordPress control panel.

Find and disable security plugins

This GIF displays a WordPress installation with a number of plugins enabled,
four of which are popular security plugins and the other two are not. The GIF clearly shows how non-security plugins are not affected by PHP malware, but other security plugins are disabled.

If one user If you try to reactivate one of the disabled security plugins, it will appear briefly that it is activated and immediately after the malware will disable it again. This behavior will continue until the malware is completely removed from the compromised environment, making it more difficult to detect malicious behavior on the site.

How does it work

The malware was found in the malicious file ./wp-includes/IXR/class-IXR-cache.php. It starts by assigning the root directory of the site to DIZIN to help you hide the loading of the WordPress master file wp-load.php:

security plugin

Using require_once to load wp-load.php allows intruder use WordPress coding hooks and variables to disable security plugins. First, the attacker determines the findinSecurity function that is later used to classify the table containing the plugins.

Wordpress

Another function defined by the attacker is secList which contains a table of targeted plugins that will be searched in existing plugins and disabled.

Wordpress security plugin

The two functions findinSecurity and secList are then used in the main active_plugins function used by WordPress hook get_option ('active_plugins') to obtain a list of all active plugins from the database data of WordPress. It then uses findinSecurity along with the list of targeted security plugins from SecList to search for active plugins and disable them using the WordPress hook deactivate_plugins.

Wordpress security plugin

Well, how to disable malware automatically targeted security plugins in case someone tries to reactivate them? It does this by inserting malware at the bottom of the wp-load.php file.

The injection forces wp-load.php to load the malicious file ./wp-includes/IXR/class-IXR-cache.php using require_once. Since wp-load.php runs every time a page loads on a WordPress site, any reactivated plugins will be automatically disabled the next time loading of the page - regardless of whether it comes from the same user or by a young person visitor on the homepage of the site.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

Ransomware hit New Jersey University Hospital

A massive data breach occurred at New Jersey University Hospital (UHNJ) as 48.000 items were exposed after a ransomware attack.

Email security training is phishing scam

A new phishing campaign pretends to be a well-known security company, sending its victims email security training.

Mozilla is launching a search for YouTube's suggestion algorithm

YouTube algorithm can lead you to some very strange suggestions, suggesting videos that seem to be to your liking ...

PS5: Sony has announced the price and release date of the console

Ready for PlayStation 5? Now you can pre-order the new console at selected retailers for the price of 500 ...

Biohacking: An exciting prospect, but only for the rich?

A global study finds that many users find biohacking exciting, but remain intimidated by hacking and privacy.

GNOME 3.38: What changes does the next version contain?

Recently, after 6 months of development, the next version of the GNOME environment was released. The new version 3.38 ...

New Pinephone distribution with 13 operating systems released

Today, many users use dual-boot systems, which allow the use of two operating systems at the same time ....

Google Drive: It will delete the trash files

Google is changing the way Google Drive handles files and documents in the Recycle Bin ...

Security and privacy features of iOS 14 and iPadOS 14

Apple has equipped iOS 14 and iPadOS 14 for iPhone and iPad with even greater security, in order to maintain ...

Microsoft for BSOD on ThinkPad: Lenovo's solution is not recommended

Microsoft has finally released a support update that describes in detail how to deal with the BSODs that appear on Lenovo ThinkPad due to ...