Blog

Stealthy Malware Targeting Wordfence

Benjamin Hosack
Jul 11, 2024
1 min read

Tags:

Malware
Cybersecurity

During a recent investigation into a compromised eCommerce website, a suspicious file modification was detected that coincided with the introduction of malware into the system. A file associated with WordFence, a popular security plugin for WordPress, had its size increased by a mere 39 bytes. An initial review did not reveal any obvious backdoor, which is commonly expected with such minor changes.

To pinpoint the exact modifications, a fresh copy of the WordFence plugin was downloaded for manual comparison. The team found that only two lines had been added to the file.

Wordfence malware insertion

The first line, "@chmod(FILE, 0444);", changed the file permissions to read-only, preventing any further changes or updates. The second addition was a single "continue" statement, strategically placed within a while loop that processes each file on the filesystem during a scan. This placement caused the loop to skip processing entirely, effectively preventing the WordFence scanner from detecting any files.  This enabled the criminals to load malicious code elsewhere in the site that would not trigger an alert in Wordfence.

Wordfence scanner corrupted by hackers

This incident underscores the importance of File Integrity Monitoring (FIM). Such subtle modifications might appear harmless and would likely evade detection by traditional malware scanners.  

However, with ThreatView Advanced, forensic-level analytics are built into the technology, enabling a full file change review within seconds.  As an example, here is a screenshot of a change comparison of code within a file with malware inserted:

ecommerce file change analysis

Proactive security. Simplified.

TRY THREATVIEW ADVANCED

Article by Bhavin Patel, Foregenix Threat Intelligence Group

Read Other Blog Articles

PCI DSS & Protecting The eCommerce Payment Ecosystem

Benjamin Hosack
November 11,2025
5 min read
eCommerce
Web Security
Cybersecurity

eCommerce businesses are facing a rapidly growing threat, targeting their payment data. This has been documented in our ThreatScape Reports over the years - and the most telling number for us is the total number of hacked sites we detect each time we conduct a global scan for threats across our portfolio - this morning's result reported over 48,000 sites detected with malware.

Magento & Adobe Commerce Facing Major Attack Surge: SessionReaper

Benjamin Hosack
5 days ago
2 min read
eCommerce
Magento
Web Security

Magento 2 and Adobe Commerce users are currently dealing with a critical security crisis: the SessionReaper...

MirrorMask: a tiny code change that silently skims checkout data

Benjamin Hosack
Aug 15
5 min read
Indicators of Compromise

At Turaco Labs, we have identified a live digital skimmer (e-skimmer) that hijacks Stripe...

Proudly, designed, developed and maintained by Tecbot.