Someone bought 30 WordPress plugins and planted a backdoor in all of them
Supply-Chain Attack Pattern & Monetization
- Attackers legally bought ~30 popular WordPress plugins, then shipped backdoored updates.
- Payload focused mostly on SEO spam and backlinks (payday loans, pharmacies, casinos), shown only to crawlers like Googlebot.
- Compromised sites can be resold on underground markets for phishing, fake security popups, and other malware delivery.
WordPress Plugin Ecosystem
- WordPress encourages many small, single-purpose plugins from solo devs; users treat “update available” as a trust signal without noticing ownership changes.
- Free security plugins are often installed “set-and-forget,” creating a false sense of safety; attackers can even whitelist their own files in scans.
- Premium plugins may be worse: no .org review, updates tied to ongoing payments, many abandoned but still widely installed.
- Some see WordPress (and especially its plugin model) as fundamentally too risky and move to static-site generators like Hugo.
Dependency Culture Across Ecosystems
- Strong parallels drawn to npm, browser extensions, Python, Rust, etc.: deep transitive dependency trees that nobody audits.
- Growing preference for languages with rich standard libraries (Go, Java, .NET, C/Fortran) and for “zero or few deps” libraries.
- Lockfiles, pinned versions, SAST, and tools like Dependabot/govulncheck help but don’t solve ownership-transfer attacks.
AI / LLMs in the Supply Chain
- Proposals: LLM-based vetting of releases (e.g., “$1 per scan”) and AI labelers that flag suspicious diffs or behavior.
- Supporters think AI can scale review and catch obfuscated or “underhanded” code; skeptics note prompt injection, attacker willingness to pay, and token costs.
- Some devs now use LLMs to reimplement small libraries instead of depending on large ecosystems.
Decentralized Package Management (FAIR)
- FAIR proposes a federated, DID-based package ecosystem with independent “labelers” (security scanners, community rules) and aggregators that choose which repos to index.
- Advocates argue this enables pluggable policy (e.g., block new DIDs, flagged packages); critics fear it could just multiply malware repos and increase discovery burden.
Crypto & Economic Incentives
- Many argue cryptocurrencies massively scaled ransomware and monetized hacking; others stress data-theft remains lucrative regardless.
- This campaign used Ethereum smart contracts for C2 domain resolution, making takedowns harder and prompting discussion of endpoint/firewall blocking.
- Debate over crypto’s broader tradeoffs: crime-enabler vs tool for financial sovereignty and resistance to censorship.
Governance, Liability & Regulation Ideas
- Suggestions include:
- “Software building codes” with legal liability for insecure practices.
- Mandatory transparency and user notification when plugins/repos change ownership.
- Potential limits or approvals on selling established extensions or plugin businesses.
- Counterarguments: cross-border enforceability is weak; bad actors can lie; risk of heavy-handed rules that harm benign sellers more than attackers.
Mitigations & Developer Practices
- Recommendations:
- Avoid auto-updating low-trust plugins; consider manual installs and audits.
- Use network allowlists so CMS instances can only call specific domains; block unnecessary blockchain endpoints.
- Minimize dependencies; prefer strong stdlibs and long-lived, “complete” libraries.
- Use lockfiles, age policies, hash-pinning, and vulnerability scanners; be cautious with bot-opened “small bump” PRs.
Broader Security Reflections
- Several comments frame this as an incentives and governance failure rather than a pure technical one.
- Insider threats and simple bribery are highlighted as major real-world risks.
- There’s recurring tension between speed-to-market and rigorous engineering; participants note we know how to build much safer software but rarely accept the cost.