Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
WordPress Nightmare: Rogue Admins and SEO Spam Infect Plugins
Multiple WordPress plugins have been backdoored, creating rogue administrator accounts and injecting SEO spam. Users should check for suspicious accounts with usernames “Options” and “PluginAuth.”

Hot Take:
Looks like some WordPress plugins are moonlighting as malicious spies. Who knew your favorite plugin could be this two-faced?
Key Points:
- Multiple WordPress plugins have been backdoored to inject malicious code.
- Injected malware creates rogue admin accounts to perform arbitrary actions.
- Malicious JavaScript is also being added to website footers for SEO spam.
- Rogue admin usernames are “Options” and “PluginAuth.”
- Earliest signs of the attack date back to June 21, 2024.