Cybersecurity researchers have identified a new wave of attacks targeting WordPress sites through fake security plugins that grant attackers remote administrative access. These malicious plugins enable hackers to hijack websites, inject spam advertisements, steal credit card information, and reinstall themselves even after removal. Some victims have reported losing their AdSense earnings due to these intrusions. Additionally, a stealthy malware loader named MintsLoader is being used in phishing campaigns to deploy GhostWeaver, a persistent PowerShell-based trojan that steals browser data and hijacks systems. The attacks employ advanced tactics such as domain generation algorithms (DGA) and Transport Layer Security (TLS) to evade detection. This campaign operates covertly, injecting JavaScript dynamically and allowing attackers to regain administrator access at any time, thus posing a sustained threat to WordPress users and developers. Efforts to protect developer secrets are also being intensified as attackers increase their focus on these targets.
Attackers Ramp Up Efforts Targeting Developer Secrets https://t.co/v7Vk3QqRKA
Un plugin planqué, un accès administrateur récupérable à tout moment, et du JavaScript injecté à la volée. Derrière cette nouvelle attaque ciblant WordPress, une campagne bien ficelée qui passe presque inaperçue. https://t.co/6p27OdoJD2
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks: https://t.co/Hn0HLba7o2 by The Hacker News #infosec #cybersecurity #technology #news