
Recent reports highlight a significant security threat targeting WordPress websites. A new type of malicious plugin has been identified that is specifically designed to steal crucial admin credentials. This poses a severe risk, potentially leading to full website compromise.
The way this deceptive plugin operates is particularly concerning. It typically disguises itself, often bundled within pirated themes or nulled plugins downloaded from untrusted sources. Once installed and activated, it stealthily injects malicious code onto the site, primarily targeting the login page. The code is designed to capture usernames and passwords entered by users, especially site administrators. This captured data is then transmitted to external servers controlled by attackers, bypassing standard WordPress security measures.
The consequences of falling victim to this phishing technique are dire. With stolen admin credentials, attackers gain complete control over the affected website. This can lead to various malicious activities, including injecting malware into the site to infect visitors, defacing the website, stealing sensitive data, using the site for spam campaigns, or completely locking the legitimate administrator out. Identifying such a threat can be difficult as the plugin often leaves minimal detectable traces on the surface. Protecting your site requires vigilance, strictly using themes and plugins only from reputable sources, maintaining regular backups, and employing robust security practices including strong passwords and potentially a security plugin capable of scanning for malicious code. Staying informed about the latest threats is paramount to maintaining a secure WordPress environment.
Source: https://blog.sucuri.net/2025/06/fake-wordpress-caching-plugin-used-to-steal-admin-credentials.html