Sucuri Detects 185 Percent Rise in WordPress Hacks Targeting UpdraftPlus Plugins

Sucuri, one of the leading WordPress security firms, released a significant security report revealing that WordPress sites using the UpdraftPlus backup...

Sucuri, one of the leading WordPress security firms, released a significant security report revealing that WordPress sites using the UpdraftPlus backup plugin experienced a 185 percent surge in attack attempts. This spike represents a dangerous shift in how attackers are targeting WordPress installations, moving away from generic vulnerabilities and toward specific, widely-used plugins that millions of site owners rely on daily. The 185 percent increase was documented over a defined period by Sucuri’s threat research team, which monitors attack patterns across hundreds of thousands of WordPress installations worldwide. The reason attackers are zeroing in on UpdraftPlus is straightforward: the plugin sits at the intersection of two high-value targets.

UpdraftPlus handles backup creation, storage management, and restoration—critical functions that give attackers direct access to sensitive site data if compromised. An attacker who gains control of a backup plugin doesn’t just compromise the current site; they potentially gain access to historical versions of the site, database credentials, and configuration files. For a site owner using UpdraftPlus to back up to cloud services like Amazon S3, Dropbox, or Google Drive, a successful breach could expose backup storage credentials as well. This attack pattern reflects a broader trend in WordPress security: as core WordPress gets more secure with each release, attackers increasingly target the plugin ecosystem, where security practices vary widely and updates are inconsistent.

Table of Contents

Why Is UpdraftPlus Being Targeted More Than Ever?

UpdraftPlus’s popularity is both its greatest strength and its primary vulnerability in this context. With millions of active installations across wordpress sites of all sizes, the plugin represents a massive attack surface. Attackers using automated scanning tools can quickly identify UpdraftPlus installations by looking for specific file paths and endpoints—`wp-content/plugins/updraftplus/` is a dead giveaway—and then probe for known weaknesses or unpatched versions. A single vulnerability discovered in UpdraftPlus affects a potentially massive number of sites, making the effort to weaponize it worthwhile for attackers. The second reason centers on what UpdraftPlus touches: it integrates directly with WordPress’s core functions and has elevated permissions within the system.

It also frequently interacts with external cloud storage services, which means compromising it could expose not just the WordPress site but also credentials for third-party services. A site owner who stores UpdraftPlus backups on Google Drive, for example, might unknowingly expose their Google account credentials if the plugin is breached and those credentials are stored in plaintext or poorly encrypted configuration files. Outdated versions of UpdraftPlus are particularly vulnerable. Many site owners install UpdraftPlus, configure it, and then forget about it—they don’t update it as regularly as they update WordPress core. This creates a lag where known vulnerabilities persist on live sites for weeks or months, giving attackers a stable target population to attack.

Why Is UpdraftPlus Being Targeted More Than Ever?

How Are These Attacks Succeeding?

The attacks documented by Sucuri leverage a combination of techniques. Some exploit outdated versions of UpdraftPlus that contain known vulnerabilities—CVEs that have been public for months or longer. Others use brute-force or credential-stuffing attacks against UpdraftPlus admin panels, especially on sites where the administrator account uses weak or predictable passwords. A third vector involves leveraging other WordPress vulnerabilities to gain initial access, then escalating privileges to tamper with UpdraftPlus directly. One critical limitation in UpdraftPlus’s security model is that it stores configuration data—including cloud storage credentials—directly in the WordPress database and in its settings files.

If an attacker gains database access through any means, they can extract those credentials without touching UpdraftPlus’s code at all. This means even sites that have updated UpdraftPlus can still suffer credential theft if their database security is weak or if another vulnerability has already exposed their database. The backup restoration process itself is a potential attack vector. If an attacker can manipulate backup files before restoration, they could inject malicious code directly into the restored site. Sucuri’s research doesn’t specify whether the 185 percent surge includes restoration-phase attacks, but the threat is well-documented in WordPress security communities.

Increase in WordPress Plugin Attack Attempts (Sucuri Data)Pre-2024100% (index, baseline 100)2024 Q1-Q2145% (index, baseline 100)2024 Q3-Q4178% (index, baseline 100)2025 Q1-Q2210% (index, baseline 100)UpdraftPlus Specific285% (index, baseline 100)Source: Sucuri Threat Intelligence Report

What Does a Real UpdraftPlus Compromise Look Like?

A typical UpdraftPlus breach follows a recognizable pattern. An attacker identifies an outdated UpdraftPlus installation through automated scanning, exploits a known vulnerability to gain admin-level access, and then uses that access to create a hidden admin account or inject persistent malicious code into the site. From there, they can steal sensitive data, modify backup files to include their malicious code, or use the compromised site as a launching point for further attacks against other users. In one scenario documented by security researchers, attackers compromised a news site’s UpdraftPlus installation, gained access to the backup storage credentials (stored in UpdraftPlus config files), then accessed months of archived backups on the site owner’s Dropbox account.

They extracted database dumps containing user information, email addresses, and password hashes—not from the current site, but from historical backups that the site owner believed were secure. The site owner didn’t realize the breach until a third party alerted them to their data appearing in a leaked database dump. Another common scenario involves attackers using UpdraftPlus to inject malware into backups before triggering a site migration or restoration event. When the site owner restores from what they believe is a clean backup, they’re actually restoring malware directly into their installation.

What Does a Real UpdraftPlus Compromise Look Like?

Comparing UpdraftPlus Vulnerabilities to Other Backup Solutions

UpdraftPlus isn’t the only backup plugin in the WordPress ecosystem, but its wide adoption makes it a more lucrative target than less-popular alternatives. Other backup plugins like BackupBuddy, Jetpack Backup, and Duplicator have also faced security issues, but each has a different security posture. BackupBuddy, for example, is a premium plugin with dedicated security updates and a smaller user base, making it a less attractive target from an attacker’s ROI perspective. Jetpack Backup is tied to a larger organization with significant security resources, which raises the bar for successful attacks.

The tradeoff when choosing a backup solution involves weighing popularity against security attention. UpdraftPlus’s advantage—that it’s free, widely adopted, and well-documented—is also its disadvantage: attackers invest time in finding and exploiting vulnerabilities because the potential victim pool is massive. A smaller, less-known backup plugin might actually be safer simply because attackers don’t consider it worth targeting. However, smaller plugins also receive fewer security audits and slower vulnerability patching, which is its own risk.

What Developers and Site Owners Must Do Now

The immediate step is an audit: check whether your WordPress installations use UpdraftPlus, what version is installed, and when it was last updated. If you’re running any version older than the latest release, update immediately. Check your UpdraftPlus settings to review where backups are stored, what credentials are in use, and whether those credentials are unique to UpdraftPlus or reused elsewhere. If you’ve reused a Google Drive password or AWS access key across multiple services, consider whether that key has been exposed through the UpdraftPlus compromise. The second step is preventative hardening.

Enable two-factor authentication on any cloud storage accounts used for UpdraftPlus backups. Disable direct file access to the UpdraftPlus folder through `.htaccess` or your web server configuration—prevent attackers from directly downloading backup files even if they gain limited access to your server. Regularly download and decrypt UpdraftPlus backups to a secure, offline location, so you have a clean recovery path even if cloud credentials are compromised. A warning: if you’ve been running an outdated version of UpdraftPlus for an extended period, assume your backup credentials may have been compromised. Regenerate them immediately, and consider that historical backups may have been accessed by unauthorized parties. This is an uncomfortable realization for many site owners, but it’s the reality of the threat landscape.

What Developers and Site Owners Must Do Now

Broader Implications for the WordPress Plugin Ecosystem

Sucuri’s report underscores a systemic problem: WordPress itself is secure-by-default, but the plugin ecosystem varies wildly in security maturity. Core WordPress receives security attention from a dedicated team and a responsible disclosure process. Most plugins, even popular ones, lack comparable resources.

UpdraftPlus is maintained by a small team doing their best, but they’re not equipped to maintain security parity with a product like WordPress core. This creates an incentive structure problem. Site owners often skip plugin updates because they’re risk-averse—”if it’s not broken, don’t fix it”—but delaying security updates compounds the risk. The 185 percent increase in UpdraftPlus attacks suggests that vulnerable installations are accumulating faster than they’re being patched, giving attackers a growing pool of targets.

The Future of Plugin Security and WordPress

The WordPress plugin security landscape is slowly evolving. The WordPress.org plugin repository now requires two-factor authentication for plugin developers and has tightened security scanning of uploaded plugin code. However, these measures are reactive, not preventative.

The real solution would involve plugin developers adopting security practices standard in other industries: regular security audits, bug bounty programs, and coordinated vulnerability disclosure—but these cost money, and most WordPress plugins are maintained by small teams or individuals who can’t justify the expense. Looking forward, site owners should expect that popular WordPress plugins will continue to be attractive targets for attackers. The 185 percent rise in UpdraftPlus attacks is unlikely to be an isolated incident. Other widely-used plugins like WooCommerce, Contact Form 7, and Yoast SEO will likely see similar trends as attackers optimize their targeting toward high-value, high-volume plugins.

Conclusion

Sucuri’s report of a 185 percent surge in UpdraftPlus attacks is a wake-up call for WordPress developers and site owners. The plugin’s widespread adoption and critical role in site protection make it an ideal target, and many installations remain outdated and vulnerable. The immediate priority is auditing your installations, updating to the latest version, and hardening your backup infrastructure against compromise.

Beyond the immediate response, this attack pattern highlights a fundamental vulnerability in the WordPress ecosystem: plugin security depends on the resources and priorities of individual developers and teams, many of whom operate under budget constraints. Site owners and agencies should treat plugin security as a core responsibility, not an afterthought, and should implement regular update cycles, security audits, and credential management as standard practice. The cost of prevention is far lower than the cost of recovering from a compromised backup infrastructure.

Frequently Asked Questions

How do I know if my UpdraftPlus installation has been compromised?

Check your WordPress logs for unusual admin account creation or modification, review backup file timestamps for unauthorized changes, and examine your cloud storage access logs for logins from unfamiliar IP addresses. You can also ask your hosting provider to scan for malware or run a security plugin like Wordfence to detect known malicious signatures.

Should I switch away from UpdraftPlus entirely?

UpdraftPlus remains a solid backup solution when kept updated. Switching plugins adds migration overhead and introduces new risks during the transition. Instead, focus on keeping UpdraftPlus updated and hardening your implementation with security measures like credential rotation and offline backups.

Are my historical backups safe if UpdraftPlus was compromised?

Not necessarily. If an attacker accessed your UpdraftPlus configuration files, they could have accessed the credentials to your backup storage. Review your cloud storage access logs and consider regenerating credentials and downloading clean backups to offline storage.

Do I need to restore from a backup after an UpdraftPlus compromise?

Not automatically. If the compromise was limited to accessing UpdraftPlus configuration files, your live site may not be affected. However, if an attacker gained code execution privileges, you should restore from a backup created before the compromise date. This is why maintaining multiple backup copies is critical.

How often should I update UpdraftPlus?

Treat UpdraftPlus updates the same as WordPress core updates—install security updates immediately, and install feature updates within a week. Enable automatic updates if your hosting provider allows it, or add UpdraftPlus to your regular maintenance schedule.

What’s the best place to store UpdraftPlus backups?

Use a service separate from your web hosting provider, such as Amazon S3, Google Drive, or Dropbox. This ensures that if your hosting account is compromised, your backups remain accessible. Use service-specific credentials rather than reused passwords, and enable two-factor authentication on the storage account.


You Might Also Like