Analysis of a Malicious WordPress Plugin: The Covert Redirector
A malicious WordPress plugin named 'wordpress-player.php' has been discovered, affecting at least 26 websites. The plugin injects a hidden HTML5 video player and establishes a WebSocket connection to a command and control server. It redirects visitors to suspicious websites after 4-5 seconds, avoiding execution for logged-in users. The malware uses a fake 'WordPress Core' author name to evade detection. It impacts website integrity through unauthorized redirects, SEO degradation, and potential security risks to visitors. Mitigation steps include thorough scanning, malware removal, credential resets, software updates, and implementing a Web Application Firewall.
AI Analysis
Technical Summary
The threat involves a malicious WordPress plugin named 'wordpress-player.php' discovered impacting at least 26 websites. This plugin masquerades as a legitimate WordPress Core component by using a fake author name to evade detection by administrators and automated security tools. Technically, the plugin injects a hidden HTML5 video player element into infected websites and establishes a WebSocket connection to a remote command and control (C2) server. This persistent connection allows the attacker to maintain control and potentially update or modify the malicious payload dynamically. After a delay of 4-5 seconds, the plugin redirects visitors to suspicious and potentially harmful websites, but it deliberately avoids redirecting logged-in users, likely to reduce the chance of detection by site administrators. The redirection behavior undermines website integrity, disrupts user experience, and can degrade search engine optimization (SEO) rankings due to unauthorized redirects and potential association with malicious domains. The domains identified as C2 or redirect targets include 'steamycomfort.fun' and 'videocdnnetworkalls.monster'. The malware leverages several tactics and techniques such as command execution (T1059.007), software discovery (T1608.004), data manipulation (T1185), communication over WebSocket (T1102.002), standard application layer protocol usage (T1071.001), and user execution (T1204.001). No specific affected WordPress versions are listed, suggesting the plugin may be installed manually or via compromised third-party sources rather than exploiting a known vulnerability in WordPress core or plugins. No known exploits in the wild have been reported yet, but the stealthy nature and evasion techniques indicate a targeted campaign or supply chain compromise. The threat poses risks not only to website owners but also to visitors who may be redirected to phishing, malware distribution, or fraudulent sites, increasing the attack surface beyond the infected hosts.
Potential Impact
For European organizations, this threat can have multifaceted impacts. Firstly, the unauthorized redirects compromise website integrity and trustworthiness, potentially damaging brand reputation and customer confidence. SEO degradation caused by malicious redirects can reduce organic traffic, impacting business revenue and visibility in search engines. The redirection to suspicious sites exposes visitors to further security risks such as phishing, malware infections, or fraud, which can lead to data breaches or financial losses. Organizations handling sensitive customer data or operating e-commerce platforms may face regulatory repercussions under GDPR if the compromise leads to data exposure or insufficient protection measures. Additionally, the stealthy nature of the plugin, which avoids triggering on logged-in users, complicates detection and remediation efforts, increasing the dwell time of the malware and the potential scope of damage. The use of WebSocket connections to a C2 server indicates ongoing attacker control, which could be leveraged for further malicious activities such as data exfiltration or lateral movement within the hosting environment. Given WordPress's widespread use across European SMEs, government websites, and media outlets, the threat could disrupt critical services and erode public trust in digital platforms.
Mitigation Recommendations
To effectively mitigate this threat, European organizations should implement a multi-layered approach beyond generic advice. First, conduct comprehensive file integrity monitoring and scanning using specialized WordPress security tools and malware scanners capable of detecting obfuscated or disguised plugins like 'wordpress-player.php'. Verify plugin author information and source authenticity before installation, avoiding plugins not sourced from official repositories or trusted vendors. Employ strict access controls and audit logs to detect unauthorized plugin installations or modifications. Reset all WordPress administrator and FTP credentials following detection to prevent attacker persistence. Update WordPress core, themes, and all plugins regularly to minimize exploitation vectors, even if this specific plugin does not target a known vulnerability. Deploy a Web Application Firewall (WAF) with custom rules to detect and block suspicious WebSocket connections and unauthorized redirects. Monitor network traffic for unusual outbound connections to domains such as 'steamycomfort.fun' and 'videocdnnetworkalls.monster'. Implement Content Security Policy (CSP) headers to restrict loading of unauthorized scripts and resources. Educate site administrators about the risk of social engineering and phishing that may lead to plugin compromise. Finally, consider isolating critical WordPress instances and performing regular backups with versioning to enable rapid restoration if infection occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: steamycomfort.fun
- domain: videocdnnetworkalls.monster
Analysis of a Malicious WordPress Plugin: The Covert Redirector
Description
A malicious WordPress plugin named 'wordpress-player.php' has been discovered, affecting at least 26 websites. The plugin injects a hidden HTML5 video player and establishes a WebSocket connection to a command and control server. It redirects visitors to suspicious websites after 4-5 seconds, avoiding execution for logged-in users. The malware uses a fake 'WordPress Core' author name to evade detection. It impacts website integrity through unauthorized redirects, SEO degradation, and potential security risks to visitors. Mitigation steps include thorough scanning, malware removal, credential resets, software updates, and implementing a Web Application Firewall.
AI-Powered Analysis
Technical Analysis
The threat involves a malicious WordPress plugin named 'wordpress-player.php' discovered impacting at least 26 websites. This plugin masquerades as a legitimate WordPress Core component by using a fake author name to evade detection by administrators and automated security tools. Technically, the plugin injects a hidden HTML5 video player element into infected websites and establishes a WebSocket connection to a remote command and control (C2) server. This persistent connection allows the attacker to maintain control and potentially update or modify the malicious payload dynamically. After a delay of 4-5 seconds, the plugin redirects visitors to suspicious and potentially harmful websites, but it deliberately avoids redirecting logged-in users, likely to reduce the chance of detection by site administrators. The redirection behavior undermines website integrity, disrupts user experience, and can degrade search engine optimization (SEO) rankings due to unauthorized redirects and potential association with malicious domains. The domains identified as C2 or redirect targets include 'steamycomfort.fun' and 'videocdnnetworkalls.monster'. The malware leverages several tactics and techniques such as command execution (T1059.007), software discovery (T1608.004), data manipulation (T1185), communication over WebSocket (T1102.002), standard application layer protocol usage (T1071.001), and user execution (T1204.001). No specific affected WordPress versions are listed, suggesting the plugin may be installed manually or via compromised third-party sources rather than exploiting a known vulnerability in WordPress core or plugins. No known exploits in the wild have been reported yet, but the stealthy nature and evasion techniques indicate a targeted campaign or supply chain compromise. The threat poses risks not only to website owners but also to visitors who may be redirected to phishing, malware distribution, or fraudulent sites, increasing the attack surface beyond the infected hosts.
Potential Impact
For European organizations, this threat can have multifaceted impacts. Firstly, the unauthorized redirects compromise website integrity and trustworthiness, potentially damaging brand reputation and customer confidence. SEO degradation caused by malicious redirects can reduce organic traffic, impacting business revenue and visibility in search engines. The redirection to suspicious sites exposes visitors to further security risks such as phishing, malware infections, or fraud, which can lead to data breaches or financial losses. Organizations handling sensitive customer data or operating e-commerce platforms may face regulatory repercussions under GDPR if the compromise leads to data exposure or insufficient protection measures. Additionally, the stealthy nature of the plugin, which avoids triggering on logged-in users, complicates detection and remediation efforts, increasing the dwell time of the malware and the potential scope of damage. The use of WebSocket connections to a C2 server indicates ongoing attacker control, which could be leveraged for further malicious activities such as data exfiltration or lateral movement within the hosting environment. Given WordPress's widespread use across European SMEs, government websites, and media outlets, the threat could disrupt critical services and erode public trust in digital platforms.
Mitigation Recommendations
To effectively mitigate this threat, European organizations should implement a multi-layered approach beyond generic advice. First, conduct comprehensive file integrity monitoring and scanning using specialized WordPress security tools and malware scanners capable of detecting obfuscated or disguised plugins like 'wordpress-player.php'. Verify plugin author information and source authenticity before installation, avoiding plugins not sourced from official repositories or trusted vendors. Employ strict access controls and audit logs to detect unauthorized plugin installations or modifications. Reset all WordPress administrator and FTP credentials following detection to prevent attacker persistence. Update WordPress core, themes, and all plugins regularly to minimize exploitation vectors, even if this specific plugin does not target a known vulnerability. Deploy a Web Application Firewall (WAF) with custom rules to detect and block suspicious WebSocket connections and unauthorized redirects. Monitor network traffic for unusual outbound connections to domains such as 'steamycomfort.fun' and 'videocdnnetworkalls.monster'. Implement Content Security Policy (CSP) headers to restrict loading of unauthorized scripts and resources. Educate site administrators about the risk of social engineering and phishing that may lead to plugin compromise. Finally, consider isolating critical WordPress instances and performing regular backups with versioning to enable rapid restoration if infection occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.sucuri.net/2025/06/analysis-of-a-malicious-wordpress-plugin-the-covert-redirector.html"]
- Adversary
- null
- Pulse Id
- 68536e4f88b62f5f7d8c4865
- Threat Score
- null
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainsteamycomfort.fun | — | |
domainvideocdnnetworkalls.monster | — |
Threat ID: 6854621733c7acc0460e0d2b
Added to database: 6/19/2025, 7:16:39 PM
Last enriched: 6/19/2025, 7:32:55 PM
Last updated: 7/30/2025, 4:18:59 PM
Views: 15
Related Threats
From ClickFix to Command: A Full PowerShell Attack Chain
MediumFake Tesla Websites Scams
MediumPhishing Attack: Deploying Malware on Indian Defense BOSS Linux
MediumExposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
Medium650 Attack Tools, One Coordinated Campaign
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.