Multiple WordPress plug-ins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts. The impacted plug-ins were hosted on WordPress.org.
Unveiling the strategies behind endpoint and mobile take-overs: critical firmware supply-chain issues, sophisticated phishing kits, WhatsApp for Windows bug letting Python, PHP scripts execute and more.
According to C3N, Europol received a disinfection solution from Sekoia, which sinkholed a command-and-control (C&C) server for a widely distributed PlugX variant in April. At the time, Sekoia suggested using the C&C server to push a custom PlugX plugin to infected devices to issue a self-deletion command that removes the infection. However, due to potential legal ramifications related to sending commands to computers not owned by the company, Sekoia instead chose to share the solution with law enforcement.
The disinfection operation began on July 18, 2024, and is expected to continue for several months.