Someone planted backdoors in dozens of WordPress plug-ins used in thousands of websites
A shadowy corporate acquisition has left thousands of websites vulnerable after dozens of popular WordPress plugins were compromised with hidden backdoors.
A shadowy corporate acquisition has left thousands of websites vulnerable after dozens of popular WordPress plugins were compromised with hidden backdoors. | Contesto: cronaca
Punti chiave
- Someone planted backdoors in dozens of WordPress plug-ins used in thousands of websites
Contesto
Dozens of widely used WordPress plugins have been compromised with hidden backdoors, potentially exposing thousands of websites to malicious code and data theft. The breach, first reported by TechCrunch, occurred after the plugins were sold to a new, unidentified corporate owner, who then allegedly used the transaction as a vector to insert malware into the software updates distributed to users. The scale of the incident, involving dozens of separate plugins, marks one of the most significant supply-chain attacks targeting the open-source website ecosystem in recent years. The attack's mechanics were deceptively simple yet devastatingly effective. Following the acquisition of the plugin portfolio, the new owner pushed out automatic updates to the existing user base. These updates, which website administrators typically trust and install to maintain security and functionality, contained obfuscated malicious code. This code created secret backdoors, granting the attackers persistent, unauthorized access to the core files of any website running the compromised plugins. The breach highlights a critical vulnerability in the trust model of open-source software, where the stewardship of widely used tools can change hands with users unaware of the new owner's intentions. WordPress powers over 40% of all websites on the internet, and its vast plugin architecture is a cornerstone of its flexibility. This incident strikes at the heart of that ecosystem. The affected plugins, while not all named in initial reports, are believed to cover a range of functions from SEO tools to contact forms and performance enhancers—common utilities found on blogs, business sites, and online stores. For website owners, the breach represents a nightmare scenario: a trusted source for essential software has become an instrument of compromise, bypassing traditional perimeter defenses by arriving as an authorized update. The implications for website security and data privacy are severe. A backdoor of this nature can be used for a multitude of criminal activities, including stealing sensitive user data like payment information and login credentials, defacing websites, installing ransomware, or...
Lettura DEO
Decisione di validazione: publish
Risk score: 0.2
Il testo è stato ricostruito dai dati editoriali disponibili senza aggiungere fatti non presenti nel record sorgente.
Indicatore di affidabilità
In evoluzione — Confidenza moderata. Alcuni dettagli potrebbero ancora cambiare.
Il sistema a semaforo
Ogni articolo su DEO include un indicatore di affidabilità:
- 🟢 Verificata — Alta confidenza. Fonti affidabili confermano la notizia.
- 🟡 In evoluzione — Confidenza moderata. Alcuni dettagli potrebbero ancora cambiare.
- 🔴 Contestata — Bassa confidenza. Fonti in conflitto o incertezze rilevanti.
Questo sistema esiste perché chi legge merita di sapere non solo cosa è successo, ma anche quanto la notizia è solida.
Categoria: cronaca