WooCommerce admins targeted by fake security patches that hijack sites

A large-scale phishing campaign targets WooCommerce users with a fake security alert urging them to download a “critical patch” that adds a WordPress backdoor to the site.

Recipients that take the bait and download the update are actually installing a malicious plugin that creates a hidden admin account on their website, downloads web shell payloads, and maintains persistent access.

The campaign, which was discovered by Patchstack researchers, appears to be a continuation of a similar operation in late 2023 that targeted WordPress users with a fake patch for a made-up vulnerability.

Patchstack says both campaigns used an unusual set of web shells, identical payload hiding methods, and similar email content.

Fake security alert

The emails targeting WordPress admins spoof the popular WooCommerce e-commerce plugin, using the address ‘help@security-woocommerce[.]com.’

Recipients are informed that their websites were targeted by hackers attempting to exploit an ‘unauthenticated administrative access’ vulnerability.

To protect their online stores and data, recipients are advised to download a patch using the embedded button, with step-by-step instructions on how to install it included in the message.

“We are contacting you regarding a critical security vulnerability found in WooCommerce platform on April 14, 2025,” reads the phishing emails.

“Warning: Our latest security scan, carried out on April 21, 2025, has confirmed that this critical vulnerability directly impacts your website.”

“We strongly advise you to take urgent measures to secure your store and protect your data,” continues the email to add a sense of urgency.

Clicking on the ‘Download Patch’ button takes victims to a website that spoofs WooCommerce, using a very deceptive ‘woocommėrce[.]com’ domain that is only one character different from the official, woocommerce.com.

The malicious domain employs a homograph attack technique where the Lithuanian character “ė” (U+0117) is used instead of an “e,” making it easy to miss.

Post-infection activity

After the victim installs the fake security fix (“authbypass-update-31297-id.zip”), it creates a randomly named cronjob that runs every minute, attempting to create a new admin-level user.

Next, the plugin registers the infected site via an HTTP GET request to ‘woocommerce-services[.]com/wpapi,’ and fetches a second-stage obfuscated payload.

This, in turn, installs multiple PHP-based web shells under ‘wp-content/uploads/,’ including P.A.S.-Form, p0wny, and WSO.

Patchstack comments that these web shells allow full control of the site and could be used for ad injection, redirecting users to malicious destinations, enlisting the server to DDoS botnets, stealing payment card information, or executing ransomware to encrypt the site and extort the owner.

To evade detection, the plugin removes itself from the visible plugin list and also hides the malicious administrator account it created.

Patchstack advises website owners to scrutinize admin accounts for 8-character random names, unusual cronjobs, a folder named ‘authbypass-update,’ and outgoing requests to woocommerce-services[.]com, woocommerce-api[.]com, or woocommerce-help[.]com.

However, the security firm notes that threat actors typically change all these indicators once they’re exposed via public research, so make sure you don’t rely on narrow-scope scans.

https://www.bleepingcomputer.com/news/security/woocommerce-admins-targeted-by-fake-security-patches-that-hijack-sites/

New email protections for a safer inbox

New Gmail protections for a safer, less spammy inbox

Starting in 2024, one significant update is coming from Gmail. These changes are focused on enhancing email security and managing your email interactions more effectively. Let’s take a closer look at what these updates entail.

New requirements for bulk senders

By February 2024, Gmail will start to require that bulk senders:

  1. Authenticate their email: You shouldn’t need to worry about the intricacies of email security standards, but you should be able to confidently rely on an email’s source. So we’re requiring those who send significant volumes to strongly authenticate their emails following well-established best practices. Ultimately, this will close loopholes exploited by attackers that threaten everyone who uses email.
  2. Enable easy unsubscription: You shouldn’t have to jump through hoops to stop receiving unwanted messages from a particular email sender. It should take one click. So we’re requiring that large senders give Gmail recipients the ability to unsubscribe from commercial email in one click, and that they process unsubscription requests within two days. We’ve built these requirements on open standards so that once senders implement them, everyone who uses email benefits.
  3. Ensure they’re sending wanted email: Nobody likes spam, and Gmail already includes many tools that keep unwanted messages out of your inbox. To add yet another protection, moving forward, we’ll enforce a clear spam rate threshold that senders must stay under to ensure Gmail recipients aren’t bombarded with unwanted messages. This is an industry first, and as a result, you should see even less spam in your inbox.

We aren’t the only ones pushing for these changes. Our industry partners also see the pressing need to institute them: “No matter who their email provider is, all users deserve the safest, most secure experience possible,” says Marcel Becker, Sr. Dir. Product at Yahoo. “In the interconnected world of email, that takes all of us working together. Yahoo looks forward to working with Google and the rest of the email community to make these common sense, high-impact changes the new industry standard.”

These practices should be considered basic email hygiene, and many senders already meet most of these requirements. For those who need help to improve their systems, we’re sharing clear guidance before enforcement begins in February 2024.

These changes are like a tune-up for the email world, and by fixing a few things under the hood, we can keep email running smoothly. But just like a tune-up, this is not a one-time exercise. Keeping email more secure, user friendly and spam-free requires constant collaboration and vigilance from the entire email community. And we’ll keep working together to make sure your inbox stays safe.

For more information, please visit:
Gmail Update: Gmail’s New Requirements
Yahoo Update: Yahoo’s Email Changes

The Complete Guide to Mastering Your Link & Navigation Structure

Learn the best practices that will help you build an efficient and user-friendly navigational structure for your ecommerce website.
One of the biggest breakdowns I see most often in website architecture is sites with poor navigation.

On a pure usability level, navigation has one job: help visitors find the information they need. But in reality, there is a lot more going on under the hood that makes a site navigation succeed (or fail).

Read more

5 Common WordPress Duplicate Content Issues & How to Fix Them

Content duplication issues that can impact rankings are easy to detect and solve on WordPress. Here’s how to fix them.

WordPress makes life easy for small businesses, bloggers, and large news sites. You have best practices automatically applied in many cases like canonical links and there are plugins for practically everything else you need.

Read more

Creative Technology. Brilliant Results!

Big or small, we’ve got a solution when you need it. Our advanced service and support tools provide you with great customer service. Contact us today to learn more about Dynamic Concepts creative technology tools.