Security-focused plugin delivers nasty backdoor
All of the malicious behavior was spread across the fake plugin's files. For example:
*class-social-facebook.php - poses as a social media spam protection tool, but the code found within sends a list of the user's plugin list to the attacker and optionally disables all plugins. The reason to disable all plugins is to shut down any other security-focused plugins that block access to login functions or would detect the hacker's unauthorized logins.
*class-term-metabox-formatter.php - sends the user's WordPress version to the attacker.
*class-admin-user-profile.php - sends a list of all WordPress admin users to the attacker.
*plugin-header.php - adds an additional admin user named mw01main.
*wp-spam-shield-pro.php - pings the hacker's server located at mainwall.org, letting the attacker know when a new user installed the fake plugin. The data this file sends over includes user, password, infected site URL, and server IP address.
This latter file also includes code to allow the attacker to upload a ZIP archive on the victim's site, unzip it, and then run the files within.
At the time security researchers found the malicious plugin, the ZIP file offered for download was corrupted, but experts believe the attacker was deploying a tainted version of the well-known
All In One SEO Pack WordPress plugin.