Skip to main content

Analysis of a Malicious WordPress Plugin: The Covert Redirector

Medium
Published: Thu Jun 19 2025 (06/19/2025, 01:56:31 UTC)
Source: AlienVault OTX General

Description

A malicious WordPress plugin named 'wordpress-player.php' has been discovered, affecting at least 26 websites. The plugin injects a hidden HTML5 video player and establishes a WebSocket connection to a command and control server. It redirects visitors to suspicious websites after 4-5 seconds, avoiding execution for logged-in users. The malware uses a fake 'WordPress Core' author name to evade detection. It impacts website integrity through unauthorized redirects, SEO degradation, and potential security risks to visitors. Mitigation steps include thorough scanning, malware removal, credential resets, software updates, and implementing a Web Application Firewall.

AI-Powered Analysis

AILast updated: 06/19/2025, 19:32:55 UTC

Technical Analysis

The threat involves a malicious WordPress plugin named 'wordpress-player.php' discovered impacting at least 26 websites. This plugin masquerades as a legitimate WordPress Core component by using a fake author name to evade detection by administrators and automated security tools. Technically, the plugin injects a hidden HTML5 video player element into infected websites and establishes a WebSocket connection to a remote command and control (C2) server. This persistent connection allows the attacker to maintain control and potentially update or modify the malicious payload dynamically. After a delay of 4-5 seconds, the plugin redirects visitors to suspicious and potentially harmful websites, but it deliberately avoids redirecting logged-in users, likely to reduce the chance of detection by site administrators. The redirection behavior undermines website integrity, disrupts user experience, and can degrade search engine optimization (SEO) rankings due to unauthorized redirects and potential association with malicious domains. The domains identified as C2 or redirect targets include 'steamycomfort.fun' and 'videocdnnetworkalls.monster'. The malware leverages several tactics and techniques such as command execution (T1059.007), software discovery (T1608.004), data manipulation (T1185), communication over WebSocket (T1102.002), standard application layer protocol usage (T1071.001), and user execution (T1204.001). No specific affected WordPress versions are listed, suggesting the plugin may be installed manually or via compromised third-party sources rather than exploiting a known vulnerability in WordPress core or plugins. No known exploits in the wild have been reported yet, but the stealthy nature and evasion techniques indicate a targeted campaign or supply chain compromise. The threat poses risks not only to website owners but also to visitors who may be redirected to phishing, malware distribution, or fraudulent sites, increasing the attack surface beyond the infected hosts.

Potential Impact

For European organizations, this threat can have multifaceted impacts. Firstly, the unauthorized redirects compromise website integrity and trustworthiness, potentially damaging brand reputation and customer confidence. SEO degradation caused by malicious redirects can reduce organic traffic, impacting business revenue and visibility in search engines. The redirection to suspicious sites exposes visitors to further security risks such as phishing, malware infections, or fraud, which can lead to data breaches or financial losses. Organizations handling sensitive customer data or operating e-commerce platforms may face regulatory repercussions under GDPR if the compromise leads to data exposure or insufficient protection measures. Additionally, the stealthy nature of the plugin, which avoids triggering on logged-in users, complicates detection and remediation efforts, increasing the dwell time of the malware and the potential scope of damage. The use of WebSocket connections to a C2 server indicates ongoing attacker control, which could be leveraged for further malicious activities such as data exfiltration or lateral movement within the hosting environment. Given WordPress's widespread use across European SMEs, government websites, and media outlets, the threat could disrupt critical services and erode public trust in digital platforms.

Mitigation Recommendations

To effectively mitigate this threat, European organizations should implement a multi-layered approach beyond generic advice. First, conduct comprehensive file integrity monitoring and scanning using specialized WordPress security tools and malware scanners capable of detecting obfuscated or disguised plugins like 'wordpress-player.php'. Verify plugin author information and source authenticity before installation, avoiding plugins not sourced from official repositories or trusted vendors. Employ strict access controls and audit logs to detect unauthorized plugin installations or modifications. Reset all WordPress administrator and FTP credentials following detection to prevent attacker persistence. Update WordPress core, themes, and all plugins regularly to minimize exploitation vectors, even if this specific plugin does not target a known vulnerability. Deploy a Web Application Firewall (WAF) with custom rules to detect and block suspicious WebSocket connections and unauthorized redirects. Monitor network traffic for unusual outbound connections to domains such as 'steamycomfort.fun' and 'videocdnnetworkalls.monster'. Implement Content Security Policy (CSP) headers to restrict loading of unauthorized scripts and resources. Educate site administrators about the risk of social engineering and phishing that may lead to plugin compromise. Finally, consider isolating critical WordPress instances and performing regular backups with versioning to enable rapid restoration if infection occurs.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.sucuri.net/2025/06/analysis-of-a-malicious-wordpress-plugin-the-covert-redirector.html"]
Adversary
null
Pulse Id
68536e4f88b62f5f7d8c4865
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainsteamycomfort.fun
domainvideocdnnetworkalls.monster

Threat ID: 6854621733c7acc0460e0d2b

Added to database: 6/19/2025, 7:16:39 PM

Last enriched: 6/19/2025, 7:32:55 PM

Last updated: 7/30/2025, 4:18:59 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats