Home News Trusted WordPress Plugins Turned into Silent Backdoors, Compromising Thousands of Websites
News

Trusted WordPress Plugins Turned into Silent Backdoors, Compromising Thousands of Websites

Malicious WordPress Plugins Breach Thousands of Sites Through Hidden Backdoors

A major security incident has led to the shutdown of over 30 WordPress plugins after they were found to contain hidden backdoors that compromised thousands of websites. These plugins were part of the “Essential Plugin” portfolio and had been quietly altered after a change in ownership.

The issue came to light when a web developer received a warning from a user, prompting a deeper investigation. This led to the discovery that at least 31 plugins had been tampered with and were capable of granting unauthorized access to affected websites.

How the Attack Worked

Rather than directly hacking individual websites, the attackers executed a supply-chain attack. They gained control of trusted plugins and used them as a gateway to infiltrate sites.

One example, the plugin Countdown Timer Ultimate, had over 20,000 active installations and contained hidden code that allowed external access. Despite receiving official updates, the malicious code remained undetected.

Further analysis revealed that the plugins behaved normally for months. The malicious code was inserted around August 2025 in an update that appeared legitimate. This delayed activation helped the attackers avoid early detection while maximizing the number of infected sites.

The Role of Ownership Change

The investigation traced the attack back to a buyer operating under the alias “Kris,” who purchased the entire Essential Plugin portfolio for a six-figure sum. The portfolio consisted of aging plugins listed for sale, making them an easy target.

After acquiring the plugins, the attacker injected backdoors into them. These backdoors allowed actions such as:

  • Redirecting visitors to spam or malicious websites
  • Displaying fake pages invisible to site administrators
  • Maintaining remote access to compromised sites

Advanced Techniques Used

One of the more sophisticated elements of the attack was the use of Ethereum smart contracts to manage command-and-control (C2) servers. This allowed the attacker to frequently change server locations, making it harder for security systems to block their activity.

Current Situation

In response, WordPress has permanently removed all affected plugins from its official repository, preventing new installations. A full list of compromised plugins has been published so users can check their websites.

Website owners are strongly advised to:

  • Immediately delete any affected plugins
  • Replace them with secure alternatives
  • Conduct a full security audit of their websites

For those who still wish to use the plugins, a patching guide has been made available, though removal is the safest option.

A Growing Threat

This incident highlights a shift in attack strategies. Instead of targeting login credentials, attackers are increasingly exploiting trusted software components like plugins.

A major concern is that WordPress does not notify users when plugin ownership changes. This allows attackers to take control of trusted tools without raising suspicion.

As a result, website administrators should:

  • Regularly review installed plugins
  • Perform monthly security audits
  • Avoid relying on outdated or poorly maintained plugins

Conclusion

This attack demonstrates how trust in widely used software can be weaponized. By compromising plugins instead of individual sites, attackers can scale their impact significantly. Staying vigilant and maintaining strict security practices is now more important than ever for WordPress users.


1 Comment

  • This incident highlights a serious shift in cybersecurity threats, where attackers exploit trusted plugins instead of directly targeting websites. It’s a strong reminder for WordPress users to regularly audit plugins, avoid outdated tools, and stay alert to unexpected changes—even in well-known extensions.

Leave a Reply to scsec Cancel reply

Your email address will not be published. Required fields are marked *

Related Articles

News

Global Crackdown Shuts Down DDoS-for-Hire Empire, Exposing Millions of Cybercriminals

Operation PowerOFF Dismantles Major DDoS-for-Hire Network An international law enforcement operation, known...

News

Microsoft Exposes Critical Android SDK Flaw Putting 50 Million Users at Risk

Microsoft researchers have disclosed a serious Android security vulnerability in a widely...

News

Global Crackdown Exposes Massive Crypto Fraud Network with Over 20,000 Victims

More than 20,000 victims of cryptocurrency fraud have been identified following a...

News

Deleted Doesn’t Mean Gone: FBI Accesses Signal Messages Through iPhone Loophole

FBI Accesses Deleted Signal Messages via iPhone Notification Data A recent court...