Smart Slider Hijacked Update Pushes Malware

Picture this: your WordPress site's slider quietly updates overnight. By morning, hackers own your admin panel. That's the Smart Slider hijack hitting hundreds of thousands right now.

Smart Slider's Update Nightmare: Hackers Slip Backdoors into 900K+ WordPress Sites — theAIcatchup

Key Takeaways

  • Hackers hijacked Smart Slider 3 Pro updates (v3.5.1.35) to push multi-layered backdoors affecting 900K+ WordPress/Joomla sites.
  • Malware creates hidden admins, steals creds, persists via mu-plugins, themes, and core file mimics — evades basic cleanups.
  • Immediate fix: Update to 3.5.1.36, full site reinstall, credential rotation, and hardening with 2FA.

Your favorite blog post slider just turned traitor. Overnight, while you slept, it invited hackers into your WordPress dashboard — full admin rights, data theft, backdoors everywhere. This Smart Slider malicious update isn’t some distant threat; it’s live, potentially compromising 900,000 sites that rely on this plugin for slick, responsive visuals.

And here’s the kicker — it happened through the one mechanism we all trust: automatic updates. Boom. Trust shattered.

Smart Slider 3 Pro, that go-to tool for whipping up eye-catching sliders without coding headaches, got its update system hijacked on April 7. Version 3.5.1.35? Pure poison. Developers scrambled, pushing 3.5.1.36 as the clean fix, urging everyone to roll back to 3.5.1.34 or earlier if needed.

But wait — it’s not just WordPress. Joomla users, you’re in the crosshairs too. Same malicious payload, creating hidden admins prefixed with ‘wpsvc_’, dumping backdoors in cache and media folders, swiping credentials like candy from a dashboard.

How Hackers Turned a Trusted Plugin into a Trojan Horse

PatchStack researchers peeled this onion back, layer by nasty layer. The malware? A beast. Fully featured toolkit crammed into the plugin’s core file, all while the slider still spins innocently for visitors.

Remote attackers fire off crafted HTTP headers — no auth needed — and execute commands. Then a second backdoor kicks in, authenticated, ready for PHP eval or full OS shell access. Credential theft? Automated. Persistence? Diabolical.

They craft a hidden admin user, stash creds in your database. Whip up a ‘mu-plugins’ folder with a fake caching plugin — you know, the kind that loads no matter what, invisible from your dashboard, undeletable without digging deep.

Don’t stop there. It injects into your theme’s functions.php. Slips a phony WordPress core file into wp-includes, pulling its auth key from a sneaky .cache_key file. Change DB passwords? Useless. This backdoor laughs, works even if WordPress won’t boot.

“Unlike the other persistence layers, this backdoor does not depend on the WordPress database, but reads its authentication key from a .cache_key file stored in the same directory,” PatchStack researchers explain.

That’s surgical. Multi-layered, evading cleanup like a virus in a sci-fi flick.

Is Your Smart Slider Site Compromised Right Now?

Over 900,000 WordPress installs. Some grabbed that poisoned update April 7 — or even April 5, thanks to timezone roulette. Vendor screams: restore backups from before then. No backup? Assume total compromise.

Check your version. See rogue admins? Files in mu-plugins pretending to cache? Theme tweaks you didn’t make? You’re hit.

Joomla mirrors the mess — hidden users, backdoors in /cache and /media, site data harvested.

This hits real people hard. Small biz owners showcasing products via sliders. Bloggers building audiences. Non-techies who picked Smart Slider for its drag-and-drop magic. One click — or auto-update — and poof, your site’s a hacker playground.

My hot take? This echoes the SolarWinds supply chain gut-punch, but democratized for the little guy. Back then, nations targeted enterprises; now, script kiddies feast on WordPress masses. Bold prediction: plugin vetting will birth AI-driven update guardians — real-time anomaly scans before any code drops. We’re on the cusp, folks, where security shifts from reactive patches to predictive shields, turning ecosystems like WordPress into fortresses.

But skepticism check — vendor’s disclosure feels a tad PR-polished. “A security breach affected the update system,” they say. Understatement of the year. How’d hackers snag control? Details sparse. Own it, fix it faster next time.

Short para for punch: Update now. Or regret it.

The Cleanup Gauntlet: Step-by-Step Survival Guide

Vendor lays it out — maintenance mode first. Backup everything, even if tainted.

Hunt unauthorized admins — delete ‘em. Nuke malicious files: mu-plugins fakes, wp-includes imposters, theme injections. Database scrub: stolen creds gone.

Reinstall WordPress core fresh. Plugins, themes too — trusted sources only. Rotate every password: WP, DB, FTP, hosting, email. Regenerate salts.

Scan logs, malware hunt. Then harden: 2FA everywhere, latest versions, admin IP restricts, passwords like fort knox — unique, beefy.

No shortcuts. Full reinstall if paranoid (smart move).

And that multi-step guide? Gold. WordPress or Joomla, it walks you through.

Why This Exposes WordPress’s Achilles Heel

Sliders seem trivial. But they’re everywhere — hero images, carousels, testimonials. Smart Slider’s live editor lured millions because it’s easy, powerful.

Yet plugins are the web’s soft underbelly. Auto-updates? Convenience weaponized against us. This malicious update proves: supply chain attacks scale effortlessly in open ecosystems.

Wonder this: as AI builders automate site creation, imagine plugins self-updating via machine learning. Thrilling — until hacked feeds poison the well. But flip it — AI could simulate attacks pre-deploy, making today’s nightmare tomorrow’s relic.

Energy here: fight back. This isn’t doom; it’s evolution’s shove toward unbreakable webs.

PatchStack’s analysis shines — automated pentests confirm paths wide open. Their BAS tools? Pair ‘em with scans. Coverage gaps kill.


🧬 Related Insights

Frequently Asked Questions

What versions of Smart Slider have the malicious update? Only Pro 3.5.1.35. Switch to 3.5.1.36 or 3.5.1.34/earlier immediately.

How do I know if my WordPress site is infected? Check for hidden admins (wpsvc_ prefix), mu-plugins folder, suspicious files in wp-includes or functions.php. Restore backups from April 4 or earlier.

Can I just delete the plugin and reinstall? Yes, but assume full compromise: clean users/files/DB, reinstall core/themes/plugins, rotate all creds, scan everything.

Marcus Rivera
Written by

Tech journalist covering AI business and enterprise adoption. 10 years in B2B media.

Frequently asked questions

What versions of Smart Slider have the malicious update?
Only Pro 3.5.1.35. Switch to 3.5.1.36 or 3.5.1.34/earlier immediately.
How do I know if my WordPress site is infected?
Check for hidden admins (wpsvc_ prefix), mu-plugins folder, suspicious files in wp-includes or functions.php. Restore backups from April 4 or earlier.
Can I just delete the plugin and reinstall?
Yes, but assume full compromise: clean users/files/DB, reinstall core/themes/plugins, rotate all creds, scan everything.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.