Blog

Stealthy Malware Targeting Wordfence

Benjamin Hosack
Jul 11, 2024
1 min read

Tags:

Malware
Cybersecurity

During a recent investigation into a compromised eCommerce website, a suspicious file modification was detected that coincided with the introduction of malware into the system. A file associated with WordFence, a popular security plugin for WordPress, had its size increased by a mere 39 bytes. An initial review did not reveal any obvious backdoor, which is commonly expected with such minor changes.

To pinpoint the exact modifications, a fresh copy of the WordFence plugin was downloaded for manual comparison. The team found that only two lines had been added to the file.

Wordfence malware insertion

The first line, "@chmod(FILE, 0444);", changed the file permissions to read-only, preventing any further changes or updates. The second addition was a single "continue" statement, strategically placed within a while loop that processes each file on the filesystem during a scan. This placement caused the loop to skip processing entirely, effectively preventing the WordFence scanner from detecting any files.  This enabled the criminals to load malicious code elsewhere in the site that would not trigger an alert in Wordfence.

Wordfence scanner corrupted by hackers

This incident underscores the importance of File Integrity Monitoring (FIM). Such subtle modifications might appear harmless and would likely evade detection by traditional malware scanners.  

However, with ThreatView Advanced, forensic-level analytics are built into the technology, enabling a full file change review within seconds.  As an example, here is a screenshot of a change comparison of code within a file with malware inserted:

ecommerce file change analysis

Proactive security. Simplified.

TRY THREATVIEW ADVANCED

Article by Bhavin Patel, Foregenix Threat Intelligence Group

Read Other Blog Articles

PolyShell and Magento: what merchants should do now

Turaco Labs
25 March 2026
4 mins
eCommerce
Magento
Malware
Web Security

A practical guide for Magento and Adobe Commerce merchants dealing with PolyShell: what it is, how to detect compromise, how ThreatView helps, and what to do next.

PrestaShop Under Attack: What We're Seeing and How to Protect Your Store

Turaco Labs
March 3, 2026
3 mins
eCommerce
Malware
Web Security

At Turaco Labs, our ThreatView telemetry has detected a concerning spike in compromised PrestaShop websites. As of this morning, we have identified 327 hacked sites actively running payload loaders or digital skimmer malware.

PrestaShop Security Alert: Protect Your Store from Digital Skimmers

Turaco Labs
February 12, 2026
3 mins
eCommerce
Magento

PrestaShop has recently issued a security alert warning store owners about a digital skimmer threat targeting their platform. If you're running a PrestaShop store, this is an important reminder to verify your site's security.

Proudly, designed, developed and maintained by Tecbot.