Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins

Posted on June 5, 2025June 5, 2025 By CWS

A complicated malware marketing campaign focusing on WordPress directors has been found, using a misleading caching plugin to steal login credentials and compromise web site safety. 

Safety researchers have recognized a malicious plugin disguised as “wp-runtime-cache” that particularly targets customers with administrative privileges, exfiltrating delicate authentication knowledge to exterior servers managed by cybercriminals.

Pretend WordPress Cache Steals Logins

Sucuri reviews that the pretend caching plugin, recognized as “wp-runtime-cache,” employs a number of misleading ways to keep away from detection whereas sustaining persistence on compromised WordPress installations. 

Not like authentic caching plugins that usually embrace a number of PHP and JavaScript recordsdata, this malicious variant consists of solely a single file: wp-runtime-cache.php.

The plugin reveals a number of purple flags that distinguish it from genuine software program. The plugin description, writer data, and URL fields stay suspiciously empty, whereas authentic plugins at all times embrace vendor identification and help sources. 

Moreover, the code comprises closely obfuscated base64 content material and makes use of randomized variable names equivalent to woocomHeic0971 and pbes2PITR0339, together with one notably telling variable named infiltrateDocumentStore0460.

The malware executes on each web page load utilizing the WordPress motion hook: add_action(‘wp_login’, ‘octopusJson50286’, 10, 2). 

This ensures the credential harvesting operate prompts each time customers try and authenticate by way of the WordPress admin panel.

The plugin implements a complicated role-based focusing on system that particularly hunts for high-privilege customers. 

Upon login makes an attempt, the malware checks consumer capabilities in opposition to predefined base64-encoded roles: bWFuYWdlX29wdGlvbnM= (manage_options for admin-level entry) and ZWRpdF9wYWdlcw== (edit_pages for editor-level entry).

When the login credentials match focused roles, the plugin constructs a knowledge array containing username, password, and consumer capabilities. 

This delicate data is then transmitted to an exterior command-and-control server through WordPress’s built-in wp_remote_post operate, sending knowledge to the decoded URL:

The malicious area woocommerce-check.com was registered on October 27, 2024, with suspicious registration particulars displaying an Arkansas tackle however a Hong Kong nation code (+852.68584411), indicating potential registration fraud.

Mitigations

The plugin incorporates superior evasion methods to stay hidden from directors. 

It makes use of the motion add_action(‘pre_current_active_plugins’, ‘pbes2PITR0339’) to take away itself from the WordPress plugins checklist, making detection by way of commonplace admin interfaces almost inconceivable.

The malware features a hardcoded hash worth WsXZjIFxgnLnC5V that enables particular malicious customers to bypass the hiding mechanism, presumably enabling attackers to handle their an infection whereas retaining the plugin invisible to authentic directors.

WordPress directors can defend their websites by way of a number of safety measures. Common safety audits utilizing server-side scanners would detect unauthorized file uploads. 

Implementing two-factor authentication (2FA) or IP restrictions on login pages gives further safety layers even when credentials are compromised.

Following any suspected compromise, directors ought to instantly replace WordPress salts in wp-config.php utilizing the WordPress.org Salt Generator, as this prevents attackers from changing hashed passwords again to plain textual content. 

Common plugin audits and sustaining up to date admin passwords stay important safety practices for stopping such refined assaults.

Pace up and enrich risk investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Admin, Admins, Beware, Cache, Fake, Logins, Plugin, Steals, WordPress

Post navigation

Previous Post: VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code
Next Post: Misconfigured HMIs Expose US Water Systems to Anyone with a Browser

Related Posts

Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups Cyber Security News
Threat Hunting 101 Proactive Strategies for Technical Teams Cyber Security News
Network Intrusion Detection for Emerging 2025 Cyber Threats Cyber Security News
Actionable Threat Intelligence for Mitigating Emerging Cyber Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News