Malware Logs

Explore our curated collection of malware logs, providing insights into various threats affecting WordPress sites and how to mitigate them.

Unmasking Trojan.PHP.Webshell.Obfuscated, Backdoor.WordPress.FakePlugin.Injector, Exploit.Kit.CloudflareMimic.PowerShell, and Webshell.Priv8Uploader.Persistence in Website Attacks

During routine monitoring, we detected anomalous behavior on a WordPress site, including unexpected redirects to fake security verification pages, unauthorized file upload forms in the interface, and server resource spikes. Logs revealed persistent unauthorized access attempts, with modified files in key directories like wp-content/plugins. The infection caused temporary site instability, but no confirmed data loss was observed. This triggered a forensic investigation to identify the root cause and mitigate risks.

July 28, 2025View Details

Fake Cloudflare CAPTCHA Malware in WordPress Environments

WordPress sites are displaying fake Cloudflare CAPTCHA prompts (e.g., “Human Verification Required” or “Unusual Traffic Detected”) that do not originate from Cloudflare. Upon interaction (e.g., clicking “Verify“), users are redirected to phishing sites, scam pages, or domains hosting malware. This often results in browser hijacking, data theft, or secondary infections. The malware persists in site files, surviving updates if not fully removed, and can spread via fake plugins or themes embedded in legitimate ones.

July 24, 2025View Details

Analyticacnodec.com and Analytwave.com Redirect Malware

The client reported unauthorized redirects from their website to a malicious URL: https://analyticacnodec.com/d3af16CD2ebF1718/. This occurred selectively on Windows-based browsers, with network requests to analytwave.com observed in developer tools. The issue involved injected JavaScript in two site files, leading to intermittent hijacks. Key concerns: visitor data theft, SEO penalties, and potential server compromises.

July 19, 2025View Details