Friday, May 9, 2025
HomeMalwareHow to Prevent wp-vcd malware Attacks on Your Website?

How to Prevent wp-vcd malware Attacks on Your Website?

Published on

SIEM as a Service

Follow Us on Google News

If your WordPress security plugin is flagging your website with a message Backdoor: PHP/wp-vcd.5473 – malicious code; it is possible that your website is infected with wp-vcd malware. This error must have raised a bunch of questions in your mind related to malware infection. For instance, what is wp-vcd malware?, how can it alter the behavior of your website?, how to safely remove it from your WordPress website? etc. The only problem is that you don’t know where to start. Don’t worry, we are here to answer these questions for you. Just stick with us for a few more minutes to get the information in detail.

The WP-VCD malware has been creating havoc since its first introduction. Over the years, it has formulated new means to hide in themes and plugins by leveraging the security loopholes. run premium themes infected with wp-vcd malware. This malware can also open up the backdoor in your website by creating hidden admin users.  Hence, it is important to understand the basics of malware infection before its removal. Therefore, before discussing the symptoms and removal of malware infection, we will discuss the basics of wp-vcd malware.

What is WP-VCD malware?

WP-VCD malware is the topmost threat to the security of a WordPress website. It is spread via null or inactive themes or plugins distributed by related sites after which it will spread itself to the websites that install them. What is more worrisome is that during the covid-19 pandemic, there have been multiple reports suggesting that this malware was injected into various links related to coronavirus statistics.

- Advertisement - Google News

The wp-vcd malware is a piece of PHP code that adds hidden admin users and injects malicious URLs in your website’s content. The general form of malware looks like codes in a given image.

@lt wp-vcd malware

Source: Malcare

How does the malware work?

To fully understand the risks of a malware attack, it is essential to understand how a malware attack alters the behavior of your WordPress website.

When a malicious code is injected, it usually stays in the core files such as functions.php/index.php. When someone visits your website via a browser, the malware will make a call to the files of your website. If these files are not found in your website, functions.php will get executed again and again creating a loop or in security language, a ‘forkbomb’.

Source: Wikipedia

Deploying malicious scripts

The first step of a malware attack includes the deployment of malicious scripts in the website content. In case of an attack, you will find these codes in the functions.php file of your theme.

This code essentially checks whether the deployed scripts are available and executes them. In the above code, you can see that the file called is the class.theme-modules.php. But depending on the source of the infection, the malicious script will sit in file class.theme-modules.php or class.plugin-modules.php.

Creates Backdoor

This code is used to create a backdoor in the website by creating hidden admin users with a name of 100010010. The objective of this admin account is to create a way back for hackers even if you delete the malware.

How to remove wp-vcd malware from your website?

There are two ways to clean your website of a wp-vcd malware infection: (1) By using a WordPress malware cleaner and security plugin and  (2) Manually. We will discuss both ways to clean your website. But, usually, manual removal is not recommended as it is very tricky. And if you miss even a single semicolon(;), it will wreck your entire website.

1. Manual removal of malware

  • The first step before any malware removal is to take backups of all the files in your website.
  • Remove the WP-VCD.php file from the WordPress core. It contains a file named functions.php that contains malware codes.
  • Do not forget to delete class.theme-modules.php and class.plugin-modules.php, otherwise, the malware will keep generating again and again.
  • Delete the wp-includes/wp-vcd.php file from the WordPress install directory.
  • Look for the files wp-includes/wp-vcd.php; wp-includes/class.wp.php; wp-includes/wp-cd.php; wp-includes/wp-feed.php; wp-includes/wp-tmp.php; in the WordPress install directory. If present, delete them.
  • Search for malicious string patterns found in infected files.
  • Run a check (diff) to ensure that codes are authentic and clean.
  • Run a malware scan.

2. Using a security plugin

The best security step you can take for your WordPress website is to install a security plugin. Astra Security Suite is one of the most reliable and trusted plugins available in the market today. With Astra, you will never have to worry about any credit card, pharma malware hack, XSS, SEO Spam, SQLi, brute force attacks and other 100+ threats. Astra’s installation takes less than 5 minutes.

How to protect your website from wp-vcd malware?

Once you have removed the malware from your website, the final and most important step is to make sure that your website does not get infected again. Follow these steps to prevent malware from breaking into your website.

  • Enable the popup blocker.
  • Always keep the core updated. The same goes for themes, plugins and other software.
  • Uninstall the inactive themes and plugins.
  • Avoid installing free third-party pieces of software.
  • Use a rock-solid firewall.
  • Take backups regularly.

Hopefully, we have hit all the key points of the wp-vcd malware attack. If you have questions, drop by comments!

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Russian COLDRIVER Hackers Deploy LOSTKEYS Malware to Steal Sensitive Information

The Google Threat Intelligence Group (GTIG) has uncovered a sophisticated new malware dubbed LOSTKEYS,...

Lampion Banking Malware Uses ClickFix Lures to Steal Banking Credentials

Unit 42 researchers at Palo Alto Networks, a highly targeted malicious campaign orchestrated by...

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...