September 15, 2017 By Shane Schick 2 min read

Approximately 200,000 websites running WordPress have been affected by a malware attack from a plug-in that installed a backdoor, allowing a malicious actor to publish spam, collect IP addresses and more.

Wordfence, a security firm that focuses on the popular content management system, said in a blog post that the malware attack has been traced to a plug-in called Display Widgets, which was purportedly designed to manage the way other plug-ins are displayed on WordPress sites. Though it has recently been removed, the threat actor behind the malicious activity did not give up easily.

According to SecurityWeek, the original creator of Display Widgets sold it in late June, after which it was almost immediately updated with a backdoor. David Law, a freelance SEO consultant, noticed the initial malware attack and informed Wordfence, which removed it from the WordPress plug-in repository.

Just a few days later, however, Display Widgets emerged again, this time with an additional file called geolocation.php that could perform the same kind of malware attack, Bleeping Computer reported. When site owners looked at their WordPress admin panels, though, the malicious content was invisible; again, Law detected the malicious activity by tracking visits to an external server by the plug-in.

History then seemed to repeat itself in July and even earlier this month, an article on SC Magazine said, with the Display Widgets owner even making it obvious that the plug-in was being refined to continue launching the same kind of malware attack. In total, the plug-in was made available at least four times before it was pulled for good.

Law has since published his own account of the Display Widgets story. In the post, he provided an overview of the various versions involved and suggested deleting the plug-in. WordPress, meanwhile, banned the developer from its platform following the malware attack and issued critical alerts each time Display Widgets was removed.

Though the extent of the damage may have been limited to spamming various websites, the story illustrates how persistent cybercriminals can be, even in the face of repeated retaliatory action by companies the size of WordPress. It’s also a cautionary tale about the relative ease with which plug-ins can be bought, sold and repurposed for uses the original creators probably never would have imagined.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today