Plug-ins is a way of vendors and third-parties extending the functionality of software – it work very well, the success of WordPress is partly based on plug-ins.
Now the threat actor vendors are taking the same approach with their malware – with the plug-ins helping to obfuscate the malware to sensors.
New ‘Lightning Framework’ Linux malware installs rootkits, backdoors (bleepingcomputer.com)
Lightning Framework, has support for plug-ins and targets Linux servers, (of which there are many on the internet), and can run a range of attacks, including installing a root-kit, giving the threat actors extensive elevated control.
My advice: Either you or your IT support need to check whether these issues impact your systems. You need to have a master document that details your systems, hardware, software, online, networks, back-ups, suppliers etc – so when cyber security (or operational) issues arise you and your support teams can quickly check if you are affected. From there you can take fast, effective action.