Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins

Posted on June 5, 2025June 5, 2025 By CWS

A complicated malware marketing campaign focusing on WordPress directors has been found, using a misleading caching plugin to steal login credentials and compromise web site safety. 

Safety researchers have recognized a malicious plugin disguised as “wp-runtime-cache” that particularly targets customers with administrative privileges, exfiltrating delicate authentication knowledge to exterior servers managed by cybercriminals.

Pretend WordPress Cache Steals Logins

Sucuri reviews that the pretend caching plugin, recognized as “wp-runtime-cache,” employs a number of misleading ways to keep away from detection whereas sustaining persistence on compromised WordPress installations. 

Not like authentic caching plugins that usually embrace a number of PHP and JavaScript recordsdata, this malicious variant consists of solely a single file: wp-runtime-cache.php.

The plugin reveals a number of purple flags that distinguish it from genuine software program. The plugin description, writer data, and URL fields stay suspiciously empty, whereas authentic plugins at all times embrace vendor identification and help sources. 

Moreover, the code comprises closely obfuscated base64 content material and makes use of randomized variable names equivalent to woocomHeic0971 and pbes2PITR0339, together with one notably telling variable named infiltrateDocumentStore0460.

The malware executes on each web page load utilizing the WordPress motion hook: add_action(‘wp_login’, ‘octopusJson50286’, 10, 2). 

This ensures the credential harvesting operate prompts each time customers try and authenticate by way of the WordPress admin panel.

The plugin implements a complicated role-based focusing on system that particularly hunts for high-privilege customers. 

Upon login makes an attempt, the malware checks consumer capabilities in opposition to predefined base64-encoded roles: bWFuYWdlX29wdGlvbnM= (manage_options for admin-level entry) and ZWRpdF9wYWdlcw== (edit_pages for editor-level entry).

When the login credentials match focused roles, the plugin constructs a knowledge array containing username, password, and consumer capabilities. 

This delicate data is then transmitted to an exterior command-and-control server through WordPress’s built-in wp_remote_post operate, sending knowledge to the decoded URL:

The malicious area woocommerce-check.com was registered on October 27, 2024, with suspicious registration particulars displaying an Arkansas tackle however a Hong Kong nation code (+852.68584411), indicating potential registration fraud.

Mitigations

The plugin incorporates superior evasion methods to stay hidden from directors. 

It makes use of the motion add_action(‘pre_current_active_plugins’, ‘pbes2PITR0339’) to take away itself from the WordPress plugins checklist, making detection by way of commonplace admin interfaces almost inconceivable.

The malware features a hardcoded hash worth WsXZjIFxgnLnC5V that enables particular malicious customers to bypass the hiding mechanism, presumably enabling attackers to handle their an infection whereas retaining the plugin invisible to authentic directors.

WordPress directors can defend their websites by way of a number of safety measures. Common safety audits utilizing server-side scanners would detect unauthorized file uploads. 

Implementing two-factor authentication (2FA) or IP restrictions on login pages gives further safety layers even when credentials are compromised.

Following any suspected compromise, directors ought to instantly replace WordPress salts in wp-config.php utilizing the WordPress.org Salt Generator, as this prevents attackers from changing hashed passwords again to plain textual content. 

Common plugin audits and sustaining up to date admin passwords stay important safety practices for stopping such refined assaults.

Pace up and enrich risk investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Admin, Admins, Beware, Cache, Fake, Logins, Plugin, Steals, WordPress

Post navigation

Previous Post: VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code
Next Post: Misconfigured HMIs Expose US Water Systems to Anyone with a Browser

Related Posts

Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News
Threat Intelligence That Powers Best SOCs Worldwide Is Now Free   Cyber Security News
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
Breaking Down Silos Aligning IT and Security Teams Cyber Security News
Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024 Cyber Security News
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Allianz Life Insurance Data Breach
  • How to Report Cyberbullying
  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Allianz Life Insurance Data Breach
  • How to Report Cyberbullying
  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News