Thanks for the report.
Jetpack, once connected to your WordPress.com account, allows you to remotely manage all your connected WordPress sites from a central dashboard. From that central dashboard, you will be able to update plugins, and also install new ones.
If you use a weak password for your Jetpack.com/WordPress.com account, or worse if you re-use a password that you’ve used on another website that had a leak in the past, malicious actors may have gained access to your Jetpack dashboard and may have installed the malicious plugin from there.
That’s a risk you take when you use a remote dashboard tool. To minimize those risks, I would strongly recommend 2 things:
- Set up a strong, unique password.
- Set up 2 Factor authentication so that even if someone were to gain access to your password, they won’t be able to log in without having access to your phone and its authentication app.
Once you’ve done so, I would recommend that you audit all sites connected to your WordPress.com account, and ensure that the malicious plugin is nowhere to be found on any of those sites.
I hope this helps.