WordPress Malware Removal

Professional cleaning and security hardening for just

WordPress Redirecting to “Play and Learn” or “Click Allow”? Check Your Theme Headers Now

Published on 1/10/2026
MD Pabel
WordPress Redirecting to "Play and Learn" or "Click Allow"? Check Your Theme Headers Now

You open your website, and for a split second, it looks normal. Then, the screen flashes, and you are suddenly redirected to a spam site asking you to “Click Allow to Verify You Are Not a Robot” or forcing a download for “Play and Learn” apps.

You open your website, and for a split second, it looks normal. Then, the screen flashes, and you are suddenly redirected to a spam site asking you to "Click Allow to Verify You Are Not a Robot" or forcing a download for "Play and Learn" apps.

You check your plugins. You check your settings. Everything looks fine.

The problem isn’t a setting—it is a sophisticated piece of malware hiding inside your website’s most critical files: header.php, footer.php, or even the core index.php.

This guide covers the “File-Based” variant of the simplecopseholding.com malware, which we are seeing spike this week.

"File-Based" variant of the simplecopseholding.com malware

The Symptoms: “Secret” Redirects

This malware is designed to be invisible to you (the site owner). It uses cookies and “User-Agent” detection to hide from logged-in administrators.

  • Admins: See a normal site.
  • Visitors (especially on mobile): Are redirected to scam domains like secretplans.discoveryment.my.id, exovandria.shop, or simplecopseholding.com.

The Code: What to Look For

Unlike the database variant we discussed previously, this version injects itself directly into your theme files.

Based on recent scans, the code looks like a harmless font loader or a performance optimization script. Do not be fooled.

Look for this specific block in your code:

<script>
(function() {
    var wf = document.createElement('script');
    wf.src = 'https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js'; 
    wf.type = 'text/javascript';
    wf.async = 'true';
    var s = document.getElementsByTagName('script')[0];
    s.parentNode.insertBefore(wf, s);
})();
</script>
<link rel='dns-prefetch' href='//simplecopseholding.com' />

redirected to scam domains like secretplans.discoveryment.my.id, exovandria.shop, or simplecopseholding.com.

Why this is dangerous:

  1. The Decoy: It loads a legitimate webfont.js from Google to look “safe” to security scanners.
  2. The Payload: The dns-prefetch tag for simplecopseholding.com is the red flag. It tells the browser to secretly prepare a connection to the hacker’s server, which then triggers the redirect.

⚠️ IMPORTANT:

If you see a bright red “Dangerous Site Ahead” warning in Chrome, Google has already flagged your site. You must remove the malware immediately to stop losing traffic.


How to Remove the Malware (File-by-File)

You need to check four specific locations where this malware loves to hide.

1. Check header.php (Most Common)

This file runs on every single page of your site.

  • How to fix: Go to Appearance > Theme File Editor and select Theme Header (header.php).
  • What to do: Look for the code block shown above, usually right before the </head> tag. Delete the script and the dns-prefetch line.

2. Check functions.php (The “Persisting” Infection)

If you delete the code from the header but it comes back instantly, it is hiding in your functions.php.

  • The Trick: The malware adds a “hook” (like wp_head) that automatically writes the virus back into your pages every time they load.
  • What to do: Open functions.php. Look for strange functions with random names (e.g., function x8s7_load_fonts()) that contain wp_head. If you see simplecopseholding inside, delete the entire function.

3. Check footer.php

Hackers know people check the header, so they sometimes move the code to the very bottom.

  • What to do: Open Theme Footer (footer.php) and check just before the </body> tag.

4. Check the Core index.php

If the redirect happens even when you switch themes, the malware is in the root of your WordPress installation.

  • Action: Connect via FTP/File Manager. Open the index.php file in your main folder.
  • Normal WordPress index.php: It should only be about 2-3 lines of code.
  • Infected index.php: If you see a giant wall of JavaScript code at the top of this file, delete the malicious code immediately.

Why Does It Keep Coming Back?

If you clean these files and the virus returns within minutes, you likely have a Backdoor File elsewhere on your server that is “healing” the virus.

Common backdoor filenames we’ve seen with this attack:

  • wp-content/themes/your-theme/db.php
  • wp-includes/css/style.php
  • wp-admin/user-login.php

Can’t Find the Code?

This malware is known for “obfuscation” (scrambling its code to look like random letters). If you are seeing the redirect but can’t find the file responsible, I can manually trace the infection source and remove the backdoor preventing re-infection.


FAQs

What is the “Play and Learn” redirect?
This is a subscription scam. The malware redirects mobile users to a page that tries to trick them into subscribing to a daily paid service (e.g., “5.05 BDT Validity 1 Days”).

Why does my site say “Dangerous” in Chrome?
Google Safe Browsing detects the redirect pattern. Once flagged, visitors will see a big red warning screen. You must remove the malware and request a review in Google Search Console to clear this.

Is it safe to just restore a backup?
Maybe, but be careful. If your backup is from 3 days ago, but the hacker installed the backdoor 2 weeks ago, you will just be restoring the virus. It is safer to clean the current files.

0 Comments

💬

No comments yet. Be the first to share your thoughts!

0/2000

By commenting you agree to our terms.

Explore Our Security Services

About the Author

MD Pabel

MD Pabel

MD Pabel is the Founder and CEO of 3Zero Digital, a leading agency specializing in custom web development, WordPress security, and malware removal. With over 8+ Years years of experience, he has completed more than3200+ projects, served over 2300+ clients, and resolved4500+ cases of malware and hacked websites.