• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

virusword.com

Learn Wordpress

  • Home
  • WordPress Shop
    • Fotopress
    • SEO Tool Kit
    • Social Contact
    • Tag Machine 2
    • Video Profits
  • Latest News
  • WordPress
    • Plugins
    • Themes
    • Tutorials
    • Videos
    • Woocommerce
  • About Us
  • Contact Us
    • Terms of Service
    • Privacy Policy
  • Show Search
Hide Search
Home/Plugins/Novel Variation of WordFence Evasion Malware Discovered

Novel Variation of WordFence Evasion Malware Discovered

WordFence Interface
  • Attackers were observed using a new variation of WordFence that hides malicious admin users and the fake plugin itself.
  • The evasion malware uses two additional obfuscated files to make admins believe nothing is wrong.
  • These fake plugins usually have names that do not match real ones, which can be an easy way to spot malicious activity.

A new variation of WordFence evasion malware was found in an infected WordPress environment, Sucuri security experts say. Malicious plugins are one of the most common variants of credit card theft malware on WooCommerce e-commerce websites, and this one was seen using some sly hiding tactics.

WordFence is one of the most popular WordPress security solutions, with over 5 million active installations, providing optional two-factor authentication (2FA) for the administrator panel, malware scanning, brute force protection, and more.

Attackers can tamper with any plugin via unauthorized access to a compromised site, and WordFence is one of them. Particular signs of infection include the plugin files containing a WPEngine plugin that does not really exist (“./wp-content/plugins/wp-engine-fast-action”) and this plugin appearing on non-WPEngine websites.

Malicious WordFence Code

Malicious WordFence Code
Image Credits: Sucuri

The malicious plugin can be triggered by using the request defined in the license_key variable. The script renames and disables WordFence and creates a malicious admin user, which permits hackers free reign over the website environment.

Two additional JavaScript and CSS obfuscated files (main.js and style.css) are included in the fake plugin for evasion purposes. The malicious code only works for WordPress admin interface URLs containing the word “Wordfence” and makes security scans look as if they were enabled. 

Malicious WordPress Function

Malicious WordPress Function
Image Credits: Sucuri

The CSS file hides the malicious plugin from the dashboard as well as the newly created hacker ID to prevent the breached website’s admins from noticing suspicious changes.

Deploying this plugin requires the website to be already breached, but researchers say it could also serve as a reinfection vector.

In previous cases, the hackers infiltrated a website and modified the WordFence plugin files to hide multiple malicious backdoors within the environment.

Source link

Written by:
Abdul Wahid
Published on:
July 9, 2024

Categories: Plugins

Primary Sidebar

Wordpress

  • Content Management Systems (2)
  • Digital Marketing (4)
  • Internet Marketing (6)
  • Latest News (458)
  • Online Business (2)
  • Plugins (519)
  • Themes (521)
  • Videos (1,350)
  • Website Development (1)
  • Woocommerce (589)
  • WordPress (6)

Recent Articles

Unlock Your Internet Marketing Success with WordPress: The Ultimate CMS for Achieving Online Goals

WordPress: A Powerhouse for Achieving Internet …

Continue Reading about Unlock Your Internet Marketing Success with WordPress: The Ultimate CMS for Achieving Online Goals

Unlock Your Internet Marketing Potential with WordPress: A Comprehensive Guide

How to Use WordPress to Achieve Your Internet …

Continue Reading about Unlock Your Internet Marketing Potential with WordPress: A Comprehensive Guide

Search our site

Explore more

Get our Wordpress Guide Get Plugins Get Connected

Footer

VirusWord by Promaps, Inc.

Barnes Place
Colombo 7, Western 00700

Copyright © 2025 · Promaps, Inc.

Keep In Touch

  • Email
  • Facebook
  • Instagram
  • Pinterest
  • Twitter