Sometimes a WordPress site looks completely normal from the outside - and yet it contains a backdoor. One especially nasty pattern is when names like one_images_user, admlnlx, or adminbackup appear as new, unknown admin users. These are not "odd coincidences," but often clear signs of an infection that is trying to secure permanent admin access.

This article is deliberately not a general "WordPress gehacked" landing page. You may already have that. Here we are dealing with the niche: an admin is created, hidden, and deletion is sabotaged.

Quick self-check: If you see this, you are very likely affected

Self-test: Signs of backdoor admins (admlnlx/adminbackup) and fake plugin one_images_user

Typical indicators (IOCs):

  • Unknown users such as admlnlx or adminbackup (administrator role)
  • Plugin/folder names such as one_images_user or wp_plugin
  • The number under "Administrators" does not match the visible list
  • When editing/deleting, you get "Invalid user ID"
  • A plugin exists on the server, but does not appear in the backend (or not reliably)

If at least one point sounds familiar: do not wait. Otherwise, such backdoors often remain "silent" - until they become active again.

What is behind one_images_user?

one_images_user sounds like a normal plugin. That is exactly the trick: such malicious packages are often named so that they look "harmless" at first glance.

Typical behavior of such fake plugins
  • An admin user is created (e.g. admlnlx)
  • This user is hidden in the user overview
  • Deletion attempts are blocked (errors like "Invalid user ID")
  • An ID/option is stored in the database so the disguise keeps working permanently

Why admlnlx and adminbackup are so critical

These names may seem random - but in practice they are often clear indicators: backdoor accounts with administrator privileges. adminbackup sounds like an "emergency account", but it is usually the opposite: an additional access point for third parties.

How WordPress users are made "invisible"

Many people think: "If I do not see the user, it does not exist." Unfortunately, that is wrong. Backdoors use WordPress hooks to manipulate the admin interface - without you noticing immediately what is happening.

What is often manipulated:

  • pre_user_query: filters the backdoor user out of the SQL query
  • views_users: falsifies the counters ("All", "Administrators") - so you do not notice anything unusual
  • Direct access to user-edit.php or delete actions is blocked

The result is devious: everything looks "normal" while an admin exists in the background.

Special case: wp_plugin/wp_plugin.php

The folder name wp_plugin looks generic. In real malware cases, this is often a module that influences visitors - for example through overlays, redirects, or injected content. Often it is not shown to everyone in the same way (e.g. only on certain devices / only a few times per cookie).

What you should do now (brief, but truly effective)

The safe sequence

  1. Remove malicious components: fully remove fake plugins/malicious code
  2. Remove backdoor users: admlnlx, adminbackup etc.
  3. Rule out persistence: mu-plugins, uploads (PHP), suspicious DB options, cron jobs
  4. Rotate access credentials: admin passwords, hosting/FTP, DB password, WordPress SALTs
  5. Harden: enforce 2FA for admins + .htaccess (main file and wp-content)
  6. Backup strategy: automate clean backups (and do not accidentally restore infected ones)

Important: "Just update" is rarely enough with this pattern. What matters is that the backdoor does not come back.

FAQ

What is the one_images_user plugin?

In cleanup cases, one_images_user is often not a legitimate plugin, but a cover name. Typically, it is used to create an admin account and hide it so that it does not stand out clearly in the backend.

Who or what is admlnlx in WordPress?

admlnlx is often an injected administrator account. Such users are sometimes hidden so well that they do not appear in the user list and deletion attempts come to nothing.

What is the adminbackup user for?

The name sounds “harmless”, but it is often an additional backdoor admin. If you did not create it yourself, you should treat it as a security incident.

Why do I get “Invalid user ID” when I try to delete a user?

This happens when malicious code manipulates the WordPress backend and specifically prevents editing or deleting a particular user. In such cases, the manipulating code must be removed first.

Why does the number of administrators not match?

A classic trick is manipulating the counters in the user view (e.g. “minus 1”) so that the hidden admin does not stand out.

If you see these names, it is a clear warning sign

one_images_user admlnlx adminbackup wp_plugin/wp_plugin.php

Note: For security reasons, this post does not contain step-by-step instructions. It is meant for identification and classification - so it is clear what you are dealing with and what needs to be done next.

Additional offers

Customers about us

„The conversion of our Joomla website from PHP 5.3 to PHP 7 was super fast, affordable, and with impeccable results. Very good and friendly communication.“
– H. Bergmann

„Within one day, everything was done extremely professionally and extremely quickly. Very trustworthy. Excellent. 5 stars“
– Fernando V.

„I was unable to help myself, but here I found the expertise needed to get everything cleaned up again. Necessary updates and backups were carried out, everything was extremely affordable, fast, and good!“
– Klaus-Peter

„The site looks great – everything as before – and on PHP 7.2 – I am impressed - many heartfelt thanks!“
– Dr. Ingo Wuddel

„Since we run an online shop, it was very important to us that our site was quickly available again with full functionality for our customers. All work is carried out extremely quickly to our complete satisfaction.“ – Loewen Handels GmbH

„Very fast, reliable, and effective handling of the problem. In addition, I was given tips and Strato-specific information to reduce the risk of the problem recurring.“
– Heino B.

„The contact was exceptionally friendly, and some cosmetic additional work was taken care of on its own - as if it were completely natural. I am relieved and very grateful.“
– R. Mayer

„Great. In an absolute emergency, after 2 domains were blocked by Strato due to a hacker attack, both domains were initially temporarily back online the same day.“
– I. Radchenko

„Excellent service. Problem solved within 18 hours. We are delighted. Thank you very much 🙏“
– Tien Sy Vuong

Website-Bereinigung.de support service Google Reviews

Contact options

This email address is being protected from spambots. You need JavaScript enabled to view it.
Contact form

Schedule a call
+49 (0)2406 969796
Mon. - Fri. | 9 am - 9 pm