Hackers Hid Backdoor in Trusted WordPress Plugins for
A sophisticated backdoor lay dormant within several trusted WordPress plugins for eight months, undetected until its activation began to compromise websites. Security researchers have now detailed...
A sophisticated backdoor lay dormant within several trusted WordPress plugins for eight months, undetected until its activation began to compromise websites. Security researchers have now detailed this
The business at the center of this incident was “Essential Plugin,” originally built by an India-based team under the name “WP Online Support” around 2015.
Over time, the team built a portfolio of more than 30 free WordPress plugins, covering tools such as countdown timers, image sliders, hero banners, and post grids. By late 2024, revenue had fallen by 35 to 45 percent, prompting founder Minesh Shah to list the entire business on Flippa.
A buyer known only as “Kris,” with a background in SEO, cryptocurrency, and online gambling marketing, acquired the portfolio for a six-figure sum, and Flippa published a case study about the deal in July 2025.
Anchor analysts and researchers identified the attack after a client reported a security notice inside their WordPress admin dashboard.
The warning came from the WordPress.org Plugins Team, flagging that a plugin called Countdown Timer Ultimate contained code allowing unauthorized third-party access.
A full security audit revealed the actual malware was not inside the plugin itself but buried deep in the site’s wp-config.php file, quietly injecting hidden spam links, fake pages, and redirects exclusively for Googlebot — staying completely invisible to site owners.

What made this attack particularly alarming was its reach. On April 7, 2026, WordPress.org permanently closed all 31 Essential Plugin plugins in a single day, affecting hundreds of thousands of active installations.
A forced auto-update to version 2.6.9.1 removed the phone-home mechanism from the plugin files. However, it never touched wp-config.php, meaning compromised sites were still silently serving hidden spam to search engines long after the patch ran.
This attack mirrors a 2017 incident where a buyer under the alias “Daley Tias” purchased the Display Widgets plugin and immediately injected payday loan spam across 200,000 sites.
Both cases followed the same approach — acquire a trusted plugin through a public marketplace, inherit commit access, and push malicious code. WordPress.org has no mechanism to flag or review ownership transfers, so there was no user notification and no code audit when the new committer took control.
The Infection Mechanism: Eight Months of Silence
The buyer’s very first commit after acquiring the business planted the backdoor. Version 2.6.7 of Countdown Timer Ultimate, released August 8, 2025, added 191 lines of code under a misleading changelog note that simply read, “Check compatibility with WordPress version 6.8.2.”
Hidden inside was a PHP deserialization backdoor — a remote execution mechanism that gave the attacker’s server control over function names, arguments, and execution entirely.
It sat dormant until April 5–6, 2026, when it was activated and analytics.essentialplugin.com began pushing malicious payloads to every affected site. T
o make takedowns nearly impossible, the malware resolved its command-and-control domain through an Ethereum smart contract querying public blockchain RPC endpoints, letting the attacker redirect traffic to any new server simply by updating the contract.
WordPress site administrators should immediately search their installations for any of the 31 closed Essential Plugin plugins and remove or replace them.
They must manually inspect wp-config.php for any injected code near the require_once call for wp-settings.php.
If the file runs roughly 6KB larger than expected, the site needs a full cleanup, not just a plugin update. WordPress.org should introduce a formal review process for plugin ownership transfers to prevent the same attack pattern from repeating.
Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.



No Comment! Be the first one.