Cyber News

Fake WordPress Caching Plugin Steals Admin Credentials, Experts Warn Site Owners

Cybersecurity analysts have issued a stark warning to WordPress site owners after uncovering a sophisticated fake caching plugin, dubbed wp-runtime-cache, that silently exfiltrates admin credentials.

The malicious plugin, discovered during a routine malware scan, exploits WordPress’s plugin architecture and cleverly masks its presence, making detection especially difficult for even seasoned administrators.

Technical Analysis: How the Malware Operates

At first glance, wp-runtime-cache appears benign, mimicking the naming conventions of legitimate performance plugins.

However, unlike authentic caching plugins, it doesn’t display any settings in the WordPress Dashboard and remains hidden from the standard plugins list.

A deeper inspection of the plugin folder reveals only a single PHP file (wp-runtime-cache.php)—another indicator of suspicious activity, as functional plugins typically require multiple files for interface and logic.

Key Red Flags in Code

The initial review of the file raises multiple alarms:

  • Empty Metadata: No author, URL, or description is specified — a hallmark of hastily assembled malware.
  • Base64 Obfuscation: The code leverages base64 encoding to mask function names, roles, and URLs, a common tactic to avoid detection.
  • Randomized Variable Names: Variables like $woocomHeic0971, $pbes2PITR0339, and $infiltrateDocumentStore0460 obfuscate the code’s real intent.
  • Suspicious User Roles: Encoded role checks specifically target high-privilege users (manage_options for admins, edit_pages for editors).

Credential Harvesting Workflow

The core function is triggered on every admin login:

phpadd_action('wp_login', 'octopusJson50286', 10, 2);

function octopusJson50286($username, $user_object) {
    // Gather username, password, roles
    // ... (base64_decode obfuscation)
    // Check if user is admin/editor
    // If yes, exfiltrate via POST
}

Decoded, the malware checks if the logging-in user matches an administrator or editor role using these role labels:

phpbWFuYWdlX29wdGlvbnM= // manage_options (Admin)
ZWRpdF9wYWdlcw==     // edit_pages (Editor)

If matched, it packages the username, password, and privilege details, and sends the data via WordPress’s wp_remote_post function to an attacker-controlled domain:

phpaHR0cHM6Ly93b29jb21tZXJjZS1jaGVjay5jb20vcmVwb3J0LXRv
// Decodes to: https://woocommerce-check[.]com/report-to

Stealth Tactics

To avoid arousing suspicion, the plugin hooks into the admin interface and employs custom hashing to hide itself from users except for the attacker’s own account, identified by a unique hardcoded hash.

This ensures normal administrators cannot see or deactivate the malicious plugin via the dashboard.

Attacker Infrastructure & Recommendations

The exfiltration domain, woocommerce-check[.]com, was registered mere months ago, with suspicious registration details blending a U.S. state with a Hong Kong phone prefix, hinting at attempts to obscure operational origins.

Security experts recommend:

  • Audit Plugins Regularly: Manually review wp-content/plugins for unknown or single-file plugins, especially those not listed in the admin panel.
  • Harden Authentication: Enable two-factor authentication (2FA) and restrict admin login via IP whitelisting.
  • Monitor File Changes: Deploy security plugins (e.g., Sucuri, Wordfence) that flag new or modified files.
  • Rotate Credentials: Change admin passwords regularly in the event of compromise.

This incident underscores the escalating sophistication of WordPress supply-chain and credential theft attacks. Even seemingly innocuous plugins can harbor deep threats. Only frequent auditing, layered defenses, and vigilance can keep site owners protected in an evolving threat landscape.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago