WooCommerce phishing campaign uses fake patch to lure victims into installing backdoors


- Patchstack spotted a new phishing campaign targeting WooCommerce users
- The email warns the users about a “critical vulnerability” that must be fixed
- The “fix” is actually malware that creates a rogue admin account and drops stage-two malware
If you are a WooCommerce user, pay attention, since there is a new phishing campaign going around targeting people like yourself.
Recently, security researchers from Patchstack spotted a new phishing attack, which they described as “large-scale” and “sophisticated”. In the attack, the crooks would send an email, warning their targets about a critical vulnerability in their websites that needs to be addressed immediately.
The email also comes with a “Download Patch” link which, instead of the supposed fix, actually deploys a malicious WordPress plugin. The plugin is hosted on a website mimicking the WooCommerce Marketplace, and can be spotted in the typosquatted URL “woocommėrce[.]com” (notice the ė character).
Old actors or new copycats?
The plugin first hides itself from the list of installed plugins, and then creates a new admin account. It also hides this account from the victim and relays the credentials to the attackers. Finally, it deploys stage-two malware, which includes web shells such as P.A.S.-Fork, p0wny, and WSO.
Patchstack, which usually tracks WordPress threats, says that a similar campaign was observed back in December 2023, with the key difference being that the phishing email warned about a non-existent CVE. Since both the emails and the malware are rather similar, the researchers speculate that both attacks are either the work of the same threat actor, or that the new campaign is the work of a copycat,
“They claim the targeted websites are impacted by a (non-existent) ‘Unauthenticated Administrative Access’ vulnerability, and they urge you to visit their phishing website, which uses an IDN homograph attack to disguise itself as the official WooCommerce website,” the researchers explained.
If you are running a WordPress website with WooCommerce installed, you should scan your site for suspicious plugins and admin accounts, and make sure to update both WordPress and the plugins/themes you are running.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Via The Hacker News
You might also like
Patchstack spotted a new phishing campaign targeting WooCommerce users The email warns the users about a “critical vulnerability” that must be fixed The “fix” is actually malware that creates a rogue admin account and drops stage-two malware If you are a WooCommerce user, pay attention, since there is a new…
Recent Posts
- Chinese vendor launches liquid-cooled mini PC powered by AMD’s most powerful AI processor, with a built-in 400W PSU
- Here are the letters that convinced Google and Apple to keep TikTok online
- The best early Prime Day deal? A free 6-month Amazon Prime membership for students
- Meet Soham Parekh, the engineer burning through tech by working at three to four startups simultaneously
- Neither AI nor E Ink can make touchscreen trackpads a good idea
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021