Stealthy WordPress Backdoor: A Hackers’ Delight or Admins’ Nightmare?
Sucuri researchers unearthed a stealth backdoor in the WordPress mu-plugins folder. This sneaky intruder grants attackers persistent admin access, a bit like giving a raccoon the keys to your trash can. It uses basic obfuscation, hides in plain sight, and is harder to remove than gum from a shoe.

Hot Take:
Well, WordPress has just gotten a little more exciting – and not in a good way! It seems the “must-use” plugin folder has decided to moonlight as a hideout for stealthy backdoors. Attackers are now playing hide and seek with your website, leaving WordPress admins scratching their heads wondering where the party crasher came from. This isn’t just a security breach; it’s a full-blown cyber soap opera playing out in your mu-plugins folder. So buckle up, WordPress admins, it’s time to get your malware-fighting gear on – this is going to be one heck of a bumpy ride!
Key Points:
- Sucuri researchers discovered a stealthy backdoor in the WordPress mu-plugins folder.
- The backdoor uses a file “wp-index.php” to load and execute a hidden payload.
- It obfuscates its code using simple ROT13 substitution, not true encryption.
- The malware includes a hidden file manager, creates a rogue admin user, and installs a malicious plugin.
- This backdoor can change admin passwords, evade detection, and reinstall itself if removed.