Stealthy WordPress Plugin Hijacks Admin Credentials: Here’s What You Need to Know

Listen to this Post

Featured Image

Silent Saboteur: A Growing Threat to WordPress Security

A dangerous new threat is quietly targeting WordPress websites. Security researchers have uncovered a deceptive plugin that poses as a performance enhancer but is, in reality, a credential-stealing malware. Named “wp-runtime-cache”, this malicious plugin infiltrates websites under the guise of a caching tool, blending seamlessly with legitimate components. Once installed, it performs its real task: stealing administrator login details and sending them to a remote command-and-control server.

The plugin was found during a routine scan and raised suspicions due to its unusual characteristics. Unlike standard caching tools that typically come with a dashboard, customization features, and multiple code files, this plugin had just one hidden PHP file. It was designed to stay invisible — not appearing in the WordPress plugin list — making it even harder for site owners to detect.

Deep analysis revealed that the plugin exploits

Even more concerning is the infrastructure behind the attack. The malicious domain to which the stolen data is sent appears to be newly registered and includes conflicting location data: it claims to be based in Arkansas, USA, but provides a Hong Kong phone number — a common misdirection tactic in cybercrime operations.

Security experts recommend immediate action: regular audits of plugins and files, enforced use of 2FA, monitoring of user activity, and regeneration of cryptographic salts in the wp-config.php file. This incident is another urgent reminder that threats are constantly evolving, and even the most familiar-looking plugins can pose grave risks.

🧠 What Undercode Say:

1. Disguised Danger

The true brilliance of this malware lies in its simplicity and stealth. By mimicking a basic caching plugin, it avoids suspicion. One file, no visible settings, no plugin listing — a minimal footprint is the perfect disguise for modern malware.

2. Hook Exploitation is the Key

The exploitation of WordPress’s built-in wp_login action hook shows deep knowledge of the platform. Instead of brute-forcing or injecting code during runtime, this malware rides on existing workflows, silently harvesting data every time a privileged user logs in.

3. Role-Based Filtering

By targeting only administrators and editors, the plugin filters out noise and avoids alerting lower-level users who might stumble across suspicious activity. This role-based targeting is a sign of precision — and professionalism — in malware development.

4. Base64 Obfuscation Tactics

While some developers use base64 for license protection, its misuse here clearly signals malicious intent. Combined with the lack of metadata and randomized function names, the plugin becomes nearly unreadable without decryption — a tactic designed to slow down security teams.

5. Evading Detection

One of the most impressive features is selective visibility: only users matching a hashed attacker ID can see the plugin in wp-admin. This type of tailored invisibility demonstrates next-level obfuscation and the intent to prolong undetected access.

6. Infrastructure Camouflage

The attacker’s infrastructure shows classic red flags. Mismatched registration data is an old trick but still effective. Using a newly created domain prevents blacklisting from previous campaigns, while the Hong Kong number injects doubt about origin and jurisdiction.

7. Weakest Link: Admins

Admin credentials are the golden keys to any WordPress site. Once compromised, attackers can install more backdoors, export sensitive data, or pivot to other servers. The plugin’s design confirms that attackers are no longer just interested in access — they want persistent control.

8. Security Hygiene is Essential

Relying solely on antivirus or basic plugin checkers is no longer enough. Regular audits, scanning for file changes, and reviewing the user list for anomalies are necessary practices. The importance of regenerating salts in wp-config.php after any breach cannot be overstated — it resets the cryptographic baseline of the site.

9. Education and Response Readiness

Website owners must be proactive, not reactive. The attack described here proves that threat actors are counting on site admins to be unaware or unprepared. Training, incident response planning, and a zero-trust mindset are more critical than ever.

10. Cybercrime as a Business

The sophistication and precision of this attack suggest that it’s part of a broader trend where malware is no longer the domain of amateurs. These plugins are commercial-grade tools in a thriving cybercrime economy — and WordPress, with its vast user base, is a prime hunting ground.

✅ Fact Checker Results:

🔍 Is the plugin “wp-runtime-cache” malicious?

✅ Yes – It steals admin credentials using hidden PHP code and obfuscation techniques.

🔍 Does the plugin remain invisible to most users?
✅ Yes – It uses hashing to hide from unauthorized viewers in wp-admin.

🔍 Is regular auditing effective against such threats?

✅ Yes – Audits, file integrity tools, and 2FA can prevent or limit the damage.

🔮 Prediction:

Expect to see more plugin-based attacks targeting WordPress in the coming months. Malware authors will likely evolve tactics to evade file scanners and leverage AI-generated code obfuscation. Security plugins will begin to include behavior analysis rather than just signature detection. WordPress administrators must adapt by combining traditional tools with active monitoring, custom firewall rules, and stronger user privilege controls. The future of CMS security is no longer about prevention alone — it’s about detection, reaction, and resilience.

References:

Reported By: cyberpress.org
Extra Source Hub:
https://www.discord.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram