Skip to main content

Hackers Hit WooCommerce Users with Fake Security Updates

A widespread phishing campaign has been targeting WooCommerce administrators globally since April 2025. The operation deceives site owners into installing fraudulent security patches that give attackers full control over their WordPress sites.

Researchers at Patchstack uncovered this operation, which mimics the widely used WooCommerce plugin through emails sent from help@security-woocommerce[.]com. The phishing emails alert recipients to a fictitious vulnerability related to unauthenticated administrative access and pressure them to install a "critical patch" by clicking an embedded button. Victims are then redirected to a counterfeit domain, woocommėrce[.]com, which uses a subtle character swap to appear authentic.

Once the user downloads the file — authbypass-update-31297-id.zip — it installs a malicious plugin that creates a hidden administrator account and connects the compromised site to a remote command server. A cronjob runs every minute to maintain access and download additional payloads, including popular PHP-based web shells like P.A.S.-Form, p0wny, and WSO. These tools enable attackers to inject ads, steal payment data, redirect visitors, launch DDoS attacks, or even deploy ransomware.

To avoid detection, the plugin removes itself from the visible plugin list and conceals the unauthorized admin account it created. It also installs backdoors in the wp-content/uploads/ directory of the infected site, providing attackers with ongoing access even after attempts to clean or restore the system.

According to Patchstack, this campaign bears striking similarities to an earlier operation from late 2023 that also used fake security notifications to compromise WordPress sites. Both campaigns relied on identical types of web shells, techniques for hiding malicious code, and nearly indistinguishable phishing language — suggesting the involvement of either the same threat actor or closely affiliated groups.

The report also urges WooCommerce site owners to examine all administrator accounts for unusual 8-character names, audit scheduled tasks like cronjobs for unfamiliar entries, and monitor outgoing traffic to suspicious domains, including woocommerce-services[.]com and woocommerce-help[.]com. Infected systems may also contain folders named authbypass-update, which should be thoroughly investigated and removed.

Another similar attack occurred just a few months earlier, in July 2023, when WordPress sites — particularly those using WooCommerce — were targeted through a critical vulnerability in the WooCommerce Payments plugin. That campaign also relied on phishing tactics to compromise administrative access, reinforcing the pattern of attackers refining and reusing successful social engineering strategies over time.

Researchers warn that once threat actors are exposed, they tend to adjust their methods to avoid detection. As a result, relying solely on previously known indicators may no longer be sufficient. A comprehensive manual audit of WordPress installations, combined with timely patching using verified updates from official sources, remains essential to securing vulnerable sites.



See TessMore Internet Business Must-Reads

Comments

Popular posts from this blog

Only 1 in 10 NFT Owners Have Never Experienced a Scam

A new survey from PrivacyHQ reveals 90% or nine out of 10 respondents experienced an NFT scam. This level of uncertainty is cause for concern for a relatively new marketplace that is generating billions of dollars. Only 1 in 10 NFT Owners Have Never Experienced a Scam The PrivacyHQ survey spoke to 1,008 people in the U.S. who are actively investing in and own NFTs. And according to the report, there are some horror stories and great lessons to be learned. The key takeaways from the survey are: Less than half of NFT owners feel their NFTs are secure Two out of 3 respondents said they had panic-sold NFTs in the past Nine out of 10 respondents had experienced an NFT scam Half of the respondents had lost access to their NFTs at some point When it comes to NFT scams there were multiple ways in which buyers were scammed. Topping the list of the most common scams experienced by these respondents starts out with the NFT provider shutting down or changing their URL at 44.8%. Next is...

Thousands Still Available in COVID Relief with These Small Business Grants

Building improvements can be a major expense for small businesses. And many had to make certain changes to navigate the past few years. Restaurants set up outdoor patios. Historic properties restored their storefronts. And offices added energy efficient features. Many businesses also have improvement projects planned for 2022. Luckily, many small business grant programs across the country make these projects more attainable, thus improving the customer experience and the community at large. Here are some current small business grant opportunities for building improvements, pandemic recovery, and more. Raleigh Building-Up Fit Grant Raleigh’s Small Business Development department is launching a new grant opportunity for local businesses. The Building-Up Fit Grant offers matching reimbursement funds up to $25,000 for eligible renovation projects. Businesses with 50 employees or less can apply for grants to cover projects that significantly improve the appearance and value of the pro...

openSNP Shutters Over Privacy and Authoritarianism Concerns

OpenSNP, a long-running open-source genetic data platform, is shutting down after citing growing concerns over data privacy, the misuse of genetic information by law enforcement, and the rise of authoritarian governments. The decision comes as 23andMe, a major source of user-submitted genetic data for openSNP, faces bankruptcy and a potential selloff of user data . Founded in 2011, openSNP allowed users to upload genetic data from services like 23andMe to make it freely available for scientific research. Co-founder Bastian Greshake Tzovaras said the closure was triggered in part by the collapse of 23andMe and the broader political climate. Speaking to TechCrunch, he stated : “The risk/benefit calculus of providing free and open access to individual genetic data in 2025 is very different compared to 14 years ago.” The database has collected roughly 7,500 genomes and supported academic work across biomedical research, information security, and more. But its founder now questions the ...