Sneaky Plugin Pandemonium: The Malware Masquerade Unleashed on WordPress!
A rogue WordPress plugin named “WordPress Core” is the latest malware mastermind, skimming credit cards and stealing credentials while moonlighting as a plugin. With fake payment forms and an uncanny ability to avoid admin pages, it’s the Houdini of malware. WordPress users, beware: your plugin might just be plotting a heist!

Hot Take:
In the world of malware, this newly discovered campaign is like the Swiss Army knife of cyber nastiness. It’s got credit card skimming, credential theft, and user profiling all rolled into one sneaky WordPress plugin. If malware were eligible for an Oscar, this one would be a strong contender. It’s so sophisticated, it even makes other hackers jealous, with its fancy new techniques and a penchant for staying one step ahead of the good guys. Forget Ocean’s Eleven; this is Ocean’s Eleven Million Lines of Code.
Key Points:
- Malware masquerades as a rogue WordPress plugin with novel anti-detection techniques.
- Active since at least September 2023, it targets checkout screens and avoids admin pages.
- Features include credit card skimming, credential theft, and user profiling.
- Three additional variants manipulate Google Ads, steal credentials, and distribute malware.
- Infected sites host a live backend system to manage stolen data.