TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
WordPress malware hides itself as WordFence protection

WordPress malware hides itself as WordFence protection

Malicious plugins are a common way for attackers to infiltrate WordPress sites, especially those with compromised admin accounts.

Emre ÇıtakbyEmre Çıtak
9 July 2024
in Security, Software
Reading Time: 3 mins read
Share on FacebookShare on Twitter

Cybersecurity has recently witnessed a new threat: A sophisticated malware targeting WordPress websites. This malware cleverly disguises itself as the popular WordFence security plugin, creating a false sense of security while disabling essential protection mechanisms and opening backdoors for attackers.

Routine check reveals a hidden WordPress malware

The discovery of this malicious software occurred during a standard investigation of a compromised WordPress website. The site administrator, initially worried about potential credit card theft, had successfully removed the immediate threat. However, a more in-depth analysis by security experts at Sucuri uncovered a more insidious problem: a malicious plugin designed to circumvent WordFence’s detection and neutralize its functions.

WordPress malware WordFence vulnerability
The WordPress malware was discovered during a routine investigation by Sucuri of a compromised website (Image credit)

The use of malicious plugins is a common tactic employed by attackers to infiltrate WordPress websites, particularly those with compromised administrator accounts. These plugins often masquerade under generic names, blending seamlessly into the site’s environment. In this particular case, the suspicious plugin was named wp-engine-fast-action, a misleading name as the website was not hosted on WPEngine, and no legitimate plugin with that name exists.

WordFence’s vulnerability under the microscope

WordFence, boasting over 5 million active installations, is a leading security solution for WordPress websites. However, despite its robust features, including two-factor authentication and a firewall service, it is not immune to exploitation. The malicious wp-engine-fast-action plugin contained a script that concealed its true purpose using base64 encoding, concatenation, and reversed strings.

Once decoded, the plugin’s harmful intent became clear: it renamed the WordFence plugin directory to “wordfence1,” effectively disabling it, created a new malicious admin user or elevated the privileges of an existing user named license_admin2, and served as a potential reinfection vector, ensuring continued access for the attackers even after the initial malware removal.

A clever disguise

To further avoid detection, the attackers incorporated additional files (main.js and style.css) into the plugin. The main.js file contained obfuscated JavaScript code that manipulated WordFence’s settings visually, creating the illusion that security scans were active when they were not. The style.css file concealed the presence of the bogus plugin and the malicious admin user from the WordPress dashboard. This deceptive code, while short, was incredibly effective in misleading users into believing their site was secure.

WordPress malware WordFence vulnerability
The attackers used additional files (main.js and style.css) to further conceal their activities and create an illusion of security (Image credit)

How to protect your WordPress website

While WordFence remains a valuable security tool for WordPress sites, this incident highlights the importance of ensuring all its features are correctly configured and remaining vigilant for potential vulnerabilities. Sucuri recommends several measures for effective threat mitigation:

  • Two-Factor Authentication (2FA): This adds an extra layer of security to logins, requiring an additional verification step beyond just a username and password.
  • Securing wp-config.php: Implementing security measures such as disallow_file_edit and disallow_file_mods can prevent unauthorized modifications to this critical file.
  • Regular updates: Keeping WordPress, themes, and plugins up-to-date ensures that known vulnerabilities are patched.
  • Website firewall: This can protect against brute force attacks and block malicious bots.
    File Integrity Monitoring: Utilizing external scanning solutions can help detect unauthorized changes to website files.

The discovery of this new WordPress malware serves as a stark reminder of the constant cat-and-mouse game between cybersecurity professionals and cybercriminals. Remember to stay informed about the latest threats and take proactive measures to protect your WordPress website.


Featured image credit: Fikret tozak/Unsplash

Tags: featuredWordPress
ShareTweet
Emre Çıtak

Emre Çıtak

Emre’s love for animals made him a veterinarian, and his passion for technology made him an editor. Making new discoveries in the field of editorial and journalism, Emre enjoys conveying information to a wide audience, which has always been a dream for him.

Related Posts

Anna’s Archive leaks 300TB of Spotify’s music catalog

Anna’s Archive leaks 300TB of Spotify’s music catalog

22 December 2025
EU regulators accuse TikTok of ongoing data transfers to China

EU regulators accuse TikTok of ongoing data transfers to China

22 December 2025
Cisco announces hackers exploiting AsyncOS zero-day

Cisco announces hackers exploiting AsyncOS zero-day

19 December 2025
Koi uncovers data harvesting in Urban VPN Proxy

Koi uncovers data harvesting in Urban VPN Proxy

19 December 2025

LATEST

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

How to connect a PS4 controller to Steam via USB or Bluetooth

How to connect your phone to Wi-Fi and fix connection issues

Apple begins iPhone 18 series production testing in January

EA investigates AI claims in Battlefield 6 cosmetics

Amazon Alexa+ will book your hotels and salons starting in 2026

OpenAI launches Skills in Codex

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska