Secure My Store

June 20, 2025
SECURITY ALERT

Critical Alert: Sophisticated Phishing Campaign Targets WooCommerce Store Owners

New malicious campaign uses fake security alerts to install backdoors on WordPress sites

Security Research Team
5 min read

Immediate Action Required

A sophisticated phishing campaign is targeting WooCommerce users with fake security alerts. The malicious emails trick store owners into downloading a "critical patch" that actually installs a backdoor on their websites. Do not download any patches from suspicious emails.

The Threat Landscape

Cybersecurity researchers have uncovered a large-scale phishing campaign specifically targeting WooCommerce store owners. The attack uses sophisticated social engineering tactics, sending fake security alerts that appear to come from legitimate WooCommerce security teams. These emails create a false sense of urgency, claiming that the recipient's website has been compromised and needs an immediate "critical patch."

What makes this campaign particularly dangerous is its professional appearance and the use of advanced techniques like homograph attacks to make malicious domains appear legitimate. Store owners who fall for this scam unknowingly install malware that gives attackers complete control over their websites.

Anatomy of the Attack

Phase 1: The Deceptive Email

The attack begins with a professionally crafted email that appears to come from 'help@security-woocommerce[.]com.' The message warns recipients about a critical vulnerability discovered on April 14, 2025, affecting their specific website.

"Warning: Our latest security scan, carried out on April 21, 2025, has confirmed that this critical vulnerability directly impacts your website. We strongly advise you to take urgent measures to secure your store and protect your data."

The email includes a prominent "Download Patch" button with detailed installation instructions, making it appear legitimate and urgent.

Phase 2: The Malicious Website

Clicking the download button redirects victims to a sophisticated fake website using the domain 'woocommėrce[.]com' – notice the Lithuanian character "ė" instead of a regular "e". This homograph attack technique makes the malicious domain nearly indistinguishable from the legitimate woocommerce.com.

Security Tip:

Always verify domain names carefully. Look for unusual characters or subtle misspellings that could indicate a homograph attack.

What Happens After Infection

1

Admin Account Creation

The malicious plugin creates a hidden admin-level user account with a random 8-character name, running a cronjob every minute to maintain access.

2

Site Registration

The infected site registers itself with the attacker's command center via HTTP requests to malicious domains.

3

Web Shell Installation

Multiple PHP-based web shells are installed, giving attackers complete control over the website for malicious activities.

4

Stealth Mode

The malicious plugin removes itself from the visible plugin list and hides the rogue admin account to avoid detection.

Protection & Detection

Immediate Actions to Take

Audit all admin accounts
Check for unusual cronjobs
Scan wp-content/uploads/ directory
Monitor outgoing network requests
Review recent plugin installations
Update all security plugins

Prevention Best Practices

  • Never download security patches from email links
  • Always verify security alerts through official channels
  • Implement regular security scans and monitoring
  • Keep WordPress and all plugins updated
  • Use strong, unique passwords for admin accounts

Need Professional Security Assessment?

Don't wait until it's too late. Our security experts can help you identify and eliminate threats before they compromise your business.

Related Security Articles

WordPress Security Best Practices

Essential security measures every WordPress site owner should implement.

Identifying Phishing Emails

Learn how to spot and avoid sophisticated phishing attempts.

Malware Removal Guide

Step-by-step instructions for cleaning infected WordPress sites.