InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted
Technology

Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted

April 28, 2025 3 Min Read
Share
Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted
SHARE

Cybersecurity researchers have warned about a massive phishing campaign targeting WooCommerce users, prompting them to download “critical patches” with fake security alerts, but instead deploying backdoors.

WordPress Security Company PatchStack described the activity as a refined variant of another campaign observed in December 2023, employing a fake CVE trick to violate sites running popular content management systems (CMS).

Given the similarities between phishing email lures, fake web pages, and the same methods employed to hide malware, the latest attack wave is considered to be either the work of the same threat actor or a new cluster that closely mimics the previous one.

“They claim that targeted websites are affected by the (non-existent) “Unrecognized Administrative Access” vulnerability, urging them to use IDN homograph attacks to access phishing websites that disguise themselves as official Woocommerce websites,” Chazz Wolcott said.

Phishing email recipients are recommended to click on the Download Patch link to download and install the expected security fixes. But in doing so, you will redirect them to a spoofed Ucommerce Marketplace page hosted in the domain you have “woocommėrce(.)com” (note the use of “ė” instead of “e”) (“authbypass-date-31297-id.zip”).

The victim is then asked to install the patch to install the regular WordPress plugin, effectively unlocking the following series of malicious actions –

  • After configuring a randomly specified Cron job that runs every minute, create a new admin-level user with an obfuscated username and a randomized password
  • Send an HTTP Get Request to an external server (“WooCommerce-Services(.)com/wpapi”) with username and password information, along with URL of the infected website
  • Send an HTTP GET request to download the next stage obfuscation payload from the second server (“woocommerce-help(.)com/activate” or “woocommerce-api(.)com/activate”)
  • Decode the payload and extract multiple web shells such as PAS fork, P0WNY, WSO, etc.
  • Hide malicious plugins from the list of plugins and hide the created admin account

The ultimate result of the campaign is that it allows attackers to remote the website, inject spam or rough ads, redirect site visitors to a rogue site, register compromised servers in a botnet to carry out DDOS attacks, and even encrypt server resources as part of a long extension scheme.

See also  Why are AI chatbots often psychophonic?

Users are advised to scan suspicious plugins or administrator accounts to ensure that the software is up to date.

Share This Article
Twitter Copy Link
Previous Article Genshin Impact Tier List-Best Characters in 5.5 Genshin Impact Tier List-Best Characters in 5.5
Next Article mm Beyond Logic: Rethinking Human Thinking with Geoffrey Hinton’s Analog Machine Theory

Latest News

mm

Why are AI chatbots often psychophonic?

Do you imagine things, or do artificial intelligence (AI) chatbots…

May 21, 2025
Researchers expose PWA JavaScript attacks that redirect users to adult fraud apps

Researchers expose PWA JavaScript attacks that redirect users to adult fraud apps

Cybersecurity researchers have discovered a new campaign that employs malicious…

May 21, 2025
mm

Please see, think, explain: The rise of the vision language model of AI

About ten years ago, artificial intelligence was split between image…

May 20, 2025
Chinese Hackers

Chinese hackers deploy Marssnake backdoor in multi-year attacks on Saudi Arabian organizations

Threat Hunter reveals tactics of threat actors who allied with…

May 20, 2025
mm

How Openai’s O3 and O4-MINI models revolutionize visual analysis and coding

In April 2025, Openai introduced its most advanced models to…

May 19, 2025

You Might Also Like

Windows CLFS Vulnerability
Technology

Microsoft Patch 126 Flaws including vulnerabilities in Windows CLFS that were actively utilized

4 Min Read
mm
Technology

Large language models remember datasets to test

14 Min Read
mm
Technology

Recover and edit human images with AI

15 Min Read
LOSTKEYS Malware
Technology

Russian hacker deploying new Lostkeys malware using Clickfix FakeCaptcha

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?