Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Summer Game Fest 2025 live updates from Xbox Games Showcase

    June 8, 2025

    These are the risk of using dark web – even if you are not breaking the law

    June 8, 2025

    The fight for gaming data continues.

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»WooCommerce Admins targeted by fake safety patch which are kidnapped sites
    Security

    WooCommerce Admins targeted by fake safety patch which are kidnapped sites

    PineapplesUpdateBy PineapplesUpdateApril 28, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    WooCommerce Admins targeted by fake safety patch which are kidnapped sites
    Share
    Facebook Twitter LinkedIn Pinterest Email

    WooCommerce Admins targeted by fake safety patch which are kidnapped sites

    A large -scale fishing campaign targets WooCommerce users with a fake safety warning that urges them to download “important patch” that adds a WordPress backdor on the site.

    The recipients who take the bait and download the update are actually installing a malicious plugin that creates a hidden administrator account on their website, downloads the web shell payload, and maintains continuously.

    Campaign, which was Discovered by patchstack Researchers seem to have a continuity of uniform operation At the end of 2023 That WordPress users were targeted with a fake patches for a med-up vulnerability.

    Patchstack says that both expeditions used an unusual set of web shells, similar payload hiding methods and similar email materials.

    Fake safety alert

    Emails targeting WordPress admins popular WooCommerce E-commerce plugin, using address ‘Help@Security-Vocomers (.) Com.’

    The recipients are informed that their websites were targeted by hackers, trying to take advantage of a ‘informal administrative access’ vulnerability.

    For the safety of their online stores and data, recipients are advised to download a patch using embedded buttons, in which how to install it with step-by-step instructions.

    “We are contacting you about a significant safety vulnerability found in the WooCommerce platform on 14 April 2025,” read the fishing email.

    “Warning: Our latest security scan made on April 21, 2025 confirmed that this important vulnerability directly affects your website.”

    “We strongly advise you to take immediate measures to secure your store and protect your data,” the email continues to add immediate spirit.

    phishing email
    Fishing email targeting WooCommerce User
    Source: Patchstack

    By clicking the ‘Download Patch’ button, it takes the victims to a website that spufs WooCommerce, using a very misleading ‘WooCommėrce (.) Com’ domain, which is only a character which is different from the official, WOOCOMERCE.com.

    The malicious domain appoints a homeograph attack technique, where the Lithuanian character “ė” (U +0117) is used instead of “E”, making it easier to miss.

    Multipate the malicious website WooCommerce platform
    Multipate the malicious website WooCommerce platform
    Source: Patchstack

    Infection activity

    After the victim installing fake safety fixes (“Authentbipus-31297-ID. Jip”), it forms a randomly designated chronzob that runs every minute, attempts to create a new administrator-level user.

    Subsequently, the plugin requested the infected site for ‘WooCommerce-Services (.) Com/WPAPI’ through an HTTP get, and receives obfuscated payloads of another stage.

    This, in turn, installs several PhP-based web shells under ‘WP-content/upload/,’, including pas-form, P0Wny and WSO.

    Patchstack comments that allow complete control of the web shell site and can be used for ad injections, users can be redirected to malicious destinations, listing the server in DDOS botnets, stealing payment card information, or executing the site to execute the site.

    To avoid detection, the plugin removes itself from the visible plugin list and also hides the malicious administrator account made.

    Patchstack advises owners of the website to examine the 8-character random names, arranged accounts for unusual chronjobs, a folder named ‘Aathbipas-Update’, and outgoing requests to WoCOMMERCE-Services (.

    However, the safety firm notes that the danger actors usually change all these indicators after being exposed through public research, so make sure that you do not rely on the narrow-scoping scan.

    admins fake kidnapped patch Safety sites targeted WooCommerce
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow many times should you change your password? Here is the real answer
    Next Article Nothing, Deputy Brand CMF announced only a new smartphone and earbuds
    PineapplesUpdate
    • Website

    Related Posts

    Security

    New Mirai Botnet infected TBK DVR device through command injection flour

    June 8, 2025
    Security

    Remove project directors presented as malicious NPM package utilities

    June 8, 2025
    Security

    Supply series attacks Glustac NPM package with 960K weekly download

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025618 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025554 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025485 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    3 years later, these JRPGs from style veterans are trapped in Purgatory despite raising around $ 2.6 million in a joint kickstarter campaign.

    May 17, 20250 Views

    How to put the right kitchen garden in a small space

    May 17, 20250 Views

    Sigma BF Hands-on: A mistake minimum

    May 17, 20250 Views
    Our Picks

    Summer Game Fest 2025 live updates from Xbox Games Showcase

    June 8, 2025

    These are the risk of using dark web – even if you are not breaking the law

    June 8, 2025

    The fight for gaming data continues.

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.