You are currently viewing WooCommerce Users Beware: Fake Security Alerts Spread Malware

WooCommerce Users Beware: Fake Security Alerts Spread Malware

Aman Mishra (GBHackers) reports on a recent phishing campaign targeting WooCommerce users, uncovered by the Patchstack security team. The attackers are using cleverly disguised emails to trick website owners into installing malicious software under the pretense of fixing a non-existent vulnerability.

A New Twist on an Old Trick

This scam falsely warns users about a made-up issue called “Unauthenticated Administrative Access” and urges them to download a “patch” from a fake website. The phishing emails look very official, mimicking real WooCommerce alerts. The domain used—woocommėrce[.]com—features a subtle character swap (notice the “ė” instead of “e”), a classic IDN homograph attack meant to deceive even careful readers.

According to Aman Mishra, this tactic is eerily similar to past “Fake CVE” attacks seen in the WordPress ecosystem, suggesting the same group might be behind it or at least using similar playbooks.

The Attack in Action

Victims who click the “Download Patch” button are taken to a fake WooCommerce Marketplace site. There, they’re prompted to install a ZIP file called authbypass-update-31297-id.zip. Once installed as a plugin, the file hides its activity by using legitimate WordPress functions.

Here’s how it works:

  • It creates a hidden admin account via a cronjob with names like mergeCreator655.
  • Sends the stolen credentials and site URL, encoded in base64, to woocommerce-services[.]com/wpapi.
  • Installs web shells like P.A.S.-Fork, p0wny, and WSO from other malicious domains.
  • Hides itself from the plugin list and masks the rogue admin account to avoid detection.

This gives the attackers full control over the site. They can:

  • Inject unwanted ads
  • Steal billing data
  • Redirect users to scam sites
  • Launch DDoS attacks
  • Or even hold your site ransom by encrypting data

Only Dangerous If You Fall for It

As emphasized by Aman Mishra, this threat only becomes real if someone installs the fake plugin. Neither WordPress nor WooCommerce will ever ask you to manually download and install updates. All legitimate patches are handled through the built-in update system.

Also read: WordPress Security Alert: XSS Vulnerability in Essential Addons for Elementor

Look out for these Indicators of Compromise:

  • A strange admin username made of random characters (e.g., jd3hr91z)
  • Unknown cronjob names in your WP Cron
  • Suspicious folders in wp-content/plugins or wp-content/uploads
  • Outgoing traffic to malicious domains like woocommerce-api[.]com

Stay Safe and Smart

Cybersecurity expert Aman Mishra advises WooCommerce users to stay alert. Double-check any urgent email alerts. Always verify update requests through official WooCommerce or WordPress dashboards—never through third-party links in emails.

As attackers evolve, so should your defense. Share this article with other website owners and help them stay one step ahead.