Attackers utilize deserted WordPress plugin to backdoor sites


Attackers are utilizing Eval PHP, an out-of-date genuine WordPress plugin, to jeopardize sites by injecting sneaky backdoors.

Eval PHP is an old WordPress plugin that permits website admins to embed PHP code on pages and posts of WordPress websites and after that carry out the code when the page is opened in the web browser.

The plugin has actually not been upgraded in the previous years and is normally thought about abandonware, yet it is still offered through the WordPress plugins repository.

According to site security company Sucuri, the pattern of utilizing Eval PHP to embed destructive code on relatively harmless WordPress pages rose in April 2023, with the WordPress plugin now having approximately 4,000 destructive setups daily.

The primary benefit of this technique versus standard backdoor injections is that Eval PHP might be recycled to reinfect cleaned up websites while keeping the point of compromise reasonably concealed.

Daily downloads of Eval PHP
Daily downloads of Eval PHP (Sucuri)

Stealthy database injections

PHP code injections spotted over the last number of weeks provide a formerly recorded payload that offers the enemies remote code execution abilities over the jeopardized website.

The destructive code is injected into the targeted sites’ databases, particularly into the ‘wp_posts’ table. This makes it more difficult to find as it averts basic site security procedures like file stability tracking, server-side scans, and so on

To do that, the hazard stars utilize a jeopardized or recently developed administrator account to set up Eval PHP, permitting them to place PHP code into pages and posts of the breached website utilizing [evalphp] shortcodes.

Payload injection code
Payload injection code (Sucuri)

Once the code runs, it drops the backdoor (3e9c0ca6bbe9. php) in the website root. The name of the backdoor might vary in between various attacks.

The destructive Eval PHP plugin setups are activated from the following IP addresses:


The backdoor does not utilize POST ask for C2 interaction to avert detection however, rather, it passes information through cookies and GET demands without noticeable specifications.

Additionally, the destructive [evalphp] shortcodes are planted in conserved drafts concealed in the SQL dump of the “wp_posts” table and not on released posts. This is still adequate to carry out the code that injects the backdoor into the site’s database.

Sucuri highlights the requirement to delist old and unmaintained plugins that hazard stars can quickly abuse for destructive functions and explains that Eval PHP isn’t the only dangerous case.

Till those accountable for handling the WordPress plugin repository choose to act, site owners are advised to act to protect their admin panels, keep their WordPress setup approximately date, and utilize a web application firewall software.

Like this post? Please share to your friends:
Leave a Reply

;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: