A key WordPress feature has been hijacked to show malicious code, spam images
techradar.com
- Researchers from Sucuri found malicious code hiding in the mu-plugins directory
- The malware redirected visitors, served spam, and could even drop malware
- The sites were compromised through vulnerable plugins, poor admin passwords, and more
A special directory in WordPress is being abused to host malicious code, researchers has claimed, warning the code allows threat actors to remain persistent on vulnerable websites, while executing arbitrary code, redirecting people to malicious websites, and displaying unwanted spam and ads.
Researchers from Sucuri discovered threat actors were hiding malicious code in “mu-plugins” (short for Must-Use plugins), a directory that stores plugins that are activated automatically and cannot be deactivated through the admin panel.
These are typically used for essential site functionality, custom modifications, or performance optimizations that should always run.
Monitor your credit score with TransUnion starting at $29.95/month
TransUnion is a credit monitoring service that helps you stay on top of ...
Copyright of this story solely belongs to techradar.com . To see the full text click HERE