Our Information Security Advisories have helped countless Australian businesses stay secure, and now we're bringing them straight to your social media feed.
Executive Summary
A phishing campaign has been identified targeting WordPress users, spreading fake WordPress security advisories regarding a non-existent vulnerability, CVE-2023-45124.
The attackers use deceptive emails, posing as WordPress, to trick administrators into downloading and installing a malicious plugin. Once installed, the plugin creates a hidden admin user and establishes a backdoor, enabling potential unauthorized access and control over affected WordPress sites.
Systems Affected
WordPress sites are vulnerable to this phishing campaign. Users who fall victim to the deceptive emails and subsequently download and install the malicious plugin are at risk.
Risk
The risk associated with this campaign is significant. Attackers gain unauthorized access and control over compromised WordPress sites, potentially leading to various malicious activities. The backdoor functionality includes file management, a SQL client, a PHP console, and a command line terminal, providing attackers with a range of capabilities.
The true operational goal of the backdoor remains unknown, but potential activities could include injecting ads, redirecting visitors, stealing sensitive information, or even blackmailing site owners.
Recommendations
References