How to Remove the WP-VCD.php Malware From Your WordPress Site

If the spam ads on your WordPress site are redirecting to a spam website, your first instinct might be to blame your advertising partner. However, chances are that your website has the wp-vcd malware instead.  

Scan your website to get an instant and definitive answer. 

The wp-vcd.php malware comes in a variety of flavours, but each one is as difficult to remove as the other. WordPress admin have tried to remove bad code directly from theme files and core folders, only to see that it all reappears when the website is reloaded. Understandably, this is a frustrating exercise, especially if you are concerned about your visitors seeing spam ads which do not represent your website at all. 

The wp-vcd malware infection has been given the dubious honour of being the most prolific malware in WordPress in recent years, and therefore a lot has been written about it. In this article, we will show you the definitive way to diagnose the infection, get rid of it, and most importantly, make sure it stays permanently gone.

TL;DR: Remove the wp-vcd hack from your WordPress website in less than 5 minutes. This malware spreads very quickly throughout your website, and if you have been trying to remove it manually, chances are that you have seen it reappear almost immediately. To permanently remove the malware, you need to delete every single instance of it, and remove the backdoor. Since this is a time-sensitive task, a security plugin is the surest and most effective way to regain your website malware-free. 

What is the wp-vcd.php malware?

The wp-vcd malware is a self-replicating malware that infects WordPress websites in order to drive traffic to spam or scam websites. The symptoms can vary a great deal, but the majority of hacked WordPress websites show spam ad pop-ups to visitors. We’ll cover the symptoms in more detail in the next section. First, let’s look a little deeper into what this malware is all about. 

How the wp-vcd malware got on your website

You may be wondering how the malware infected your website in the first place. The most common way for the wp-vcd WordPress malware to infect a website is via a nulled theme or plugin. In fact, WordFence likes to call the malware: “the malware you installed on your own site.”

Of course, this is an oversimplification, as most grandiose statements are. However, there is a grain of truth to it. Nulled themes and plugins are responsible for many of the hacks we have seen in the years, because they come loaded with malware or backdoors, sometimes even both. Wp-vcd.php is a standing example of this. However, mistakes are made, sometimes by people who developed the site and handed it over to you to manage. This is not the time for a blame game, or to get defensive. The priority is to get rid of the malware as fast as possible. 

A word of caution here: if you have many websites on shared hosting, you can reasonably expect those sites to get hacked as well. Wp-vcd is a prolific malware, and replicates itself at an alarming rate. 

How the wp-vcd malware works

As we said before, the wp-vcd.php malware generally enters your website through an infected theme or plugin. It then proceeds to infect all other installed plugins and themes. Next, it moves on to infecting core WordPress files and creating a folder. 

The upshot of this rapid spread across your website is that the malware is almost everywhere on your website, and cleanup has already become exponentially harder. The situation is further complicated and amplified if you have more than one website installed on the same Cpanel. In this case, you will see other websites getting hacked too. 

If you have tried to clean up the theme files, or even deleted the wp-vcd file before coming to this article, you may have noticed that the site gets reinfected after a while. Some of our customers have reported seeing the malware come back as soon as the site is reloaded. This is because it hasn’t been cleaned out completely, and the existing code is merely regenerating any malware you have deleted. 

The malware has a built-in backdoor, and the backdoor reloads the malware each time, so the infection reappears almost instantly. 

What the wp-vcd malware does

The goal of this malware is to drive traffic to spam websites, through the use of black hat SEO tactics or spam ads, a phenomenon known as malvertising. Additionally, by driving traffic to the spam website using ads, the malware generates ad revenue as well. It actually comes a full circle, in that the destination websites usually distribute the malware in their products. 

Apart from malvertising, the wp-vcd.php virus does other unpleasant things to your website: 

  • Creates fake admin profiles 
  • Injects spam links into your website
  • Occasionally can cause redirects as well, although not for all the traffic

More than anything, website owners and admin are worried about the impact these awful ads have on their brands. You can imagine that seeing pornographic or illegal ad content creates an unpleasant experience for visitors. No admin wants their brand and website attacked like that. 

What are the symptoms of the wp-vcd malware infecting my website?

The wp-vcd.php malware is designed to boost either the SEO or the ad revenue of a spam website. The malware does this by inserting spam links or through ad pop-ups respectively. 

In case you suspect your website has a wp-vcd infection, here are some of the symptoms you may see:

  • Spam pop-ups: Websites may have spam ad pop-ups that show up all the time or some of the time. In some cases, the ads will show up only for users that aren’t logged in. The ads can be hidden from admin users through the use of cookies. In some cases, only visitors from certain search engines will see the ads, or alternatively only a certain percentage will see them.

    The upshot is that the ads will force visitors to visit a spam site. In a sense, this is like the WordPress redirect hack.
  • Site slows down: You will see a noticeable decline in site speed and performance
  • Analytics will take a hit: If the spam ads are redirecting visitors away from your site, you will see an increase in bounce rate.
  • Google blacklist: Eventually, Google will detect the malware while indexing your website, and put it on the blacklist. Either your visitors will see a deceptive site ahead warning or a site might be hacked notice in their search results.
  • Google Ads account is suspended: Similar to the Google blacklist, if you have a Google ads account, it could get suspended because of deceptive content. Alternatively, your ads are disapproved because of detected malware. Google works very hard to ensure that their users have a safe experience, so take malware very seriously. 

WordPress hacks can appear in a variety of ways, which is one of the reasons it is so hard to determine if a website is hacked or not. If you don’t see any of the symptoms above, it isn’t a guarantee that your website is malware-free. It merely means that you haven’t seen it yet.

How to diagnose the wp-vcd.php virus infection on your website

The trouble with the wp-vcd malware—or indeed any malware—is that diagnosing an infection can be almost as frustrating as cleaning it. Many of the customers that reach out to us describe a set of symptoms that are sporadic and inconsistent, leading many of them to doubt themselves. The only definitive way to know if your website is hacked is to scan it. 

There are a few ways to scan your website for malware. We have listed them out below, in order of most to least effective. 

1. Deep scan your WordPress website

Scan your website with MalCare’s free malware scanner. All you need to do is install MalCare on your website, and sync your website to our servers. The scan is quick, and takes less than 5 minutes. You will have a definitive answer if your website is hacked. 

hacked site scan

We recommend MalCare because it deep-scans your website. That means all the WordPress core files, plugin and theme folders, and your database as well. Because the wp-vcd malicious code is so prolific, it can reside anywhere on the website. Many other scanners cannot find every instance of malware, and in the case of wp-vcd.php, this is a big negative. Also, the wp-vcd has multiple variants, evolving over the last few years to look nothing like its original code. Therefore, it is important to use a sophisticated scanner to make sure.

2. Scan your website with an online security scanner

In most cases, we would say that using an online security scanner is a good first step towards diagnosing a hack. However, in the case of wp-vcd malicious code, an online security scanner is next to useless. 

The malware resides in the theme and plugin files and folders, and replicates to the core WordPress folders in due course. These files are not visible to an online security scanner, and therefore cannot be scanned for presence of malware. This may seem like a negative mark for online security scanners, but actually it is a good thing. Online security scanners are not installed on your website, and therefore can also scan publicly visible code. You don’t want your core website code to be publicly visible. 

3. Scan for malware manually

It is theoretically possible to scan your website manually, and look for instances of wp-vcd malicious code in the files. With the wp-vcd malware, you are likely to find it in a ton of places on your website, so manually scanning your website will confirm its presence. 

Keep in mind that you are only checking if your website is hacked. Therefore, if you locate the malicious.php code, it doesn’t mean that is the only place it exists on your website. It is far more likely that the malware is in several places in actuality. 

Where the wp-vcd.php malware is located on your website

Of course, the malware starts off in the installed theme or plugin. In a theme, you will see the malicious code in the functions.php file. 

To demonstrate, we downloaded a theme from a nulled theme website, and opened up the functions.php file to highlight the malware in the functions.php file. 

Website for nulled themes
Website for nulled themes
Files of a theme
Files of a theme

If you look at the code closely, it is referencing another file, ‘class.theme-modules.php’.

wp-vcd.php malware in the functions.php file
wp-vcd.php malware in the functions.php file

This file is also located amongst the theme files, and contains the full malware code. 

Malware file in the nulled theme
Malware file in the nulled theme

It then copies itself to other themes and plugins, as we said before. Once the malware has infected a large chunk of your website, it becomes diabolically difficult to remove manually. And this spread takes place almost instantly. 

After plugins and themes, the malware will add code to the post.php file and automatically create a wp-vcd.php file and a class.wp.php file to the wp-includes folder. As you can see, these are core WordPress files and this is when things get really serious.

What does the malware look like

In order to simplify the information in this article, we are referring to the malware as the wp-vcd malware only. This is a good time to point out that the malware comes in many flavours, like wp-feed.php and wp-tmp.php. The bad code will appropriately reflect those filenames, but in essence, the malware is exactly the same. 

This is the code that can appear at the top of a functions.php file of a theme or plugin:

Wp-vcd.php malware can appear as standalone files or code inserted into critical files; quite often as a mixture of both. Here is code from a file, which runs a cron job to automate part of the malware:

Another bit of the malware that creates files in the wp-includes folder: 

Earlier in 2021, security researchers debated about there being newer variants of the malware, like ccode.php or cplugin.php for instance. These variants introduced an invisible and fake plugin into the website. 

All this is to say that the malicious code can look dramatically different across websites. Any advice that claims to get rid of the malware 100% by ‘just doing this and this’ is completely unreliable. Rest assured, your website will get reinfected almost immediately, if not instantly. Manual removal is a tedious process and prone to failure.

4. Other diagnostics

Scanning your website with a security plugin is the definitive way to determine if your website has malware. However there are a few other options you can try: 

  • Check Google Search Console for notifications under the Security Issues tab
  • Use an incognito browser to visit your website, and see if you are served up any unsavoury ads
  • Google your website to check the search results, and try visiting your website from the SERPs

If any of the diagnostics show that your website is hacked, you need to move quickly. The malware is spreading fast, and will cause you considerable damage the longer it remains unaddressed.

How to remove wp-vcd malware infection

Now that we’ve established your website has the wp-vcd malware, we need to focus on getting rid of it. There are 2 ways that you can remove wp-vcd malware from your website: 

  1. Use a security plugin [RECOMMENDED]
  2. Remove the malware manually

Before you proceed, we need to point out that these options are NOT equally effective. As we’ve mentioned before, the wp-vcd malware replicates itself a lot and can appear in many different places on your website. The manual method is sure to leave some malware behind, and you’ll be back to square one once your website gets reinfected. 

We strongly recommend using a security plugin, because, in literal minutes, the malware will be gone.

The best and easiest way to get rid of the wp-vcd malware from your WordPress website is to use MalCare. It is the best-in-class WordPress security plugin for WordPress websites and is trusted by the biggest names in the industry. 

MalCare protects over 10,000 websites from hackers and malware daily, and has a sophisticated auto-clean system that surgically removes malware from your website. You will have your website free of malware in minutes, and all your data completely intact. 

Remove wp-vcd.php malware using MalCare

To clean the wp-vcd wordpress malware from your website, all you have to do is: 

  1. Install MalCare on your WordPress website
  2. Sync your website with MalCare servers, and run the scan
  3. Once the results are in, click on auto-clean to remove the malware

And that’s it! The cleanup finishes in a few minutes, and all instances of the malware have vanished.

Why MalCare?

MalCare is our product, so we are definitely going to recommend it. However, it also is the best WordPress security plugin currently available for WordPress websites. There are a few reasons for this: 

Over and above everything we’ve just mentioned, MalCare protects your website proactively. Our security plugin is installed on 100,000+ websites, and learns about threats from each. Therefore, by adding your website to MalCare, you benefit from all that combined security knowledge—before it even becomes a problem.

2. Remove the wp-vcd malware manually

We would like to stress that this is an inefficient way to clean malware. We strongly advise against poking around in your website code. Altering code without knowing what you are doing can materially affect your website and break it. Recovery then is a big, and often expensive, hassle. 

We are putting a lot of warnings before sharing the cleaning steps because we’ve seen manual cleanups go horribly wrong. Trust us, MalCare is your best option for getting rid of the wp-vcd malicious scripts.

Steps to removing wp-vcd malware from your website

1. Backup your website

We always recommend taking a backup of your website, even if it is hacked. Your website is currently functioning, albeit with malware. If anything goes awry in the cleaning process, you can restore your backup and hopefully use a security plugin to remove the malware instead. 

2. Download WordPress core, plugins and themes from the repository

Make a list of the versions that are currently on your website of WordPress, and legitimate plugins and themes. Download fresh installs of these from the WordPress repository. These will come in handy when trying to locate malware in the files. You can use an online diffchecker to highlight the differences in code, and then identify the malware accordingly. 

3. Delete all nulled software

If you have any nulled plugins and themes installed, you need to get rid of them. Nulled software is riddled with malicious scripts, and is known to be the primary source of the wp-vcd malware. Over and above that, premium software is created and maintained by developers who dedicate their time and resources to building safe software for WordPress. It is unfair to them to use their work without compensating them for it. 

4. Clean WordPress core files and folders

By now, you already know how to access your website files. If you are cleaning the website locally or using File Manager to access the files, you first need to replace the /wp-admin and /wp-includes folders completely. 

The next thing to do is check the following files for instances of the wp-vcd malware: index.php, wp-config.php, wp-settings.php, wp-load.php, and .htaccess. The malware is known for infecting the wp-config.php file, so be extra vigilant with that one. Look for the following signatures: wp-tmp, wp-feed, and wp_vcd.
Finally, the /wp-uploads folder shouldn’t have any PHP files at all. Delete all that you see over there. This is not typical of the wp-vcd malware, but by the time you read this article that may well change. That’s how fast malware can evolve in the wild.

5. Clean the /wp-content folder

The /wp-content folder has all your plugins and themes. Compare your installed versions with the fresh installs you got from the WordPress repository. This will help you narrow down the search for malware, because then you will only have to analyse the differences. There can be additional files, for instance, or aberration in the actual code. 

It is important to note here that all differences are not necessarily bad. Customisations also appear as differences, as do malware snippets. Be cautious when deleting code, and check your website periodically to make sure it is still working. 

The wp-vcd malware in nulled themes usually shows up in the functions.php file, and then propagates from there on. 

Note: Make sure to clean parent and child themes wherever applicable. Cleaning just one or the other will result in reinfection. 

6. Clean your website database

Although wp-vcd typically resides in your website files, there are other parts of the malware that can be in the database. Check the wp_options table for correct parameters, or check the posts table for spam links that may have been added to your website. 

7. Remove backdoors

Even if you get rid of the plugin or theme that caused the infection, it doesn’t guarantee that the malware will be removed, because it could have already spread to the rest of the website. The nulled plugin or theme is only the starting point. 

Wp-vcd is notorious for leaving behind backdoors, and frustrating all manual attempts at cleaning. The malware reappears instantly when the site is reloaded for instance. This is because of backdoors. 

Backdoors are just like malware, and can be anywhere. Look for code like this: eval, base64_decode, gzinflate, preg_replace, and str_rot13 

These functions allow access from outside the website, and can be manipulated as backdoors. Having said that, they aren’t all bad. So be careful to check the usage of each instance before deleting it. 

8. Remove any additional admin users

One of the quirks of this malware is the addition of ghost admin to your website. Review the list of admin users, and remove any that look suspicious.

9. Repeat this process with subdomains and sites on shared hosting

If you have multiple installations of WordPress on your domain, or you have multiple websites on a shared hosting account, make sure to clean all the websites. Wp-vcd is notorious for infecting other installations very quickly. 

10. Clear WordPress and browser caches

Caches store a copy of your website to boost loading and performance. Once you’ve cleaned the malware from your website, make sure to flush the caches so that the old versions are removed.  

11. Use a security scanner to confirm

This is the finish line of the cleaning process. All that is left is the final confirmation that the malware has indeed been removed. 

One of the most frustrating things about the wp-vcd malware is its almost instantaneous reappearance after cleaning. It can regenerate from a single instance of forgotten or overlooked malware code in any file or folder. To avoid the frustration of seeing all your effort wasted, make sure to scan your website once more.

clean site scan

Why manual cleanups often fail

Even though we have laid out the cleaning steps above, we strongly advise against manual cleanups. Only WordPress experts should attempt a manual cleanup, and let’s face it, you wouldn’t need this guide if you were a WordPress expert. 

Here are things just some of the things that can go wrong with manual cleaning:

  • The wp-vcd malware spreads rapidly across the entire website. It can go into unexpected places, and therefore becomes difficult to find.
  • Removing the nulled theme or plugin that caused the hack isn’t sufficient, because the malware has now multiplied. Same goes for deactivating the themes and plugins. 
  • In addition to removing all instances of the malware, you need to remove all backdoors as well to prevent reinfection. 

The biggest reason that manual cleanups fail is because of inexpert removal. To be able to distinguish between malware and good code, you need to understand coding logic. That involves understanding the code itself, what it does, and how it interacts with other code.

How to prevent wp-vcd malware reinfecting your website

The malware is gone, and it is time to take some precautionary measures. Wp-vcd is an especially stubborn malware, and it can reinfect the website at the drop of a hat. So here are some things to do so that your site remains secure and malware-free: 

  • Never use nulled software no matter how attractive the immediate cost-savings may seem. In the long run, you end up paying a great deal more in terms of damages and loss of revenue. 
  • Install a security plugin which will scan, clean, and protect your website. Although, be warned that even the best security plugin cannot protect against malware that you install yourself on your website. 
  • Review admin users regularly; in fact review all users regularly and make sure to implement a least-privileges account policy. 
  • Check file permissions of critical files.
  • Set up a password policy and require all users set strong passwords on their accounts.

You can also choose to harden WordPress, which includes measures such as adding two-factor authentication and preventing php execution in certain folders.

What is the impact of the Wp-vcd malware attack on your website

The wp-vcd malware may not make itself immediately apparent to the logged in admin, but your visitors are potentially getting an eyeful of illegal drugs, grey market products, or potentially profane content in the form of ads. You don’t need us to tell you: that’s bad news. 

Here are some of the repercussions of the wp-vcd.php malware attack we’ve seen on websites: 

  • Loss of trust from visitors, and therefore loss of revenue
  • Google blacklist
  • Security issues in Google Search Console
  • SEO rankings falling because of Google’s blacklist
  • Site suspended by web host
  • Legal issues from disgruntled users

And many more. Long story short, all malware is bad and has terrible consequences for everyone except the hacker. Since you are not running your website for hackers, take hacks seriously and remove them as soon as possible. 

Conclusion

The best way to scan, clean, and protect your website from hackers and their egregious malware is to install a security plugin. The wp-vcd.php malware needs a strong security solution to get rid of it, after all, and frankly manual cleaning never does the job. 

Also, please don’t install nulled software. Apart from literally stealing from the developers, it is just poor short-term savings, which work out to be very expensive in the long run. 

We hope you found this article helpful and now have a better understanding of the wp-vcd malware. Please drop us a line if you have any questions. We’d love to hear from you! 

FAQs

What is wp-includes/wp-vcd.php?

wp-includes/wp-vcd.php is a malware file created by the wp-vcd malware, and hidden in the core WordPress folder /wp-includes. This malware file enables the malware to replicate itself in different parts of the WordPress website, so even after it is cleaned, it often reappears. 

The wp-vcd hack creates spam links on your website, creates fake admin users, and shows malvertising pop-ups to divert your visitors to spam sites. If you see this file in your /wp-includes folder, your WordPress website has been hacked, and you need to clean it immediately. 

What is WP-VCD.php?

wp-vcd.php is a very common malware that affects WordPress websites. Websites are usually infected because of the installation of nulled themes or plugins. The wp-vcd.php virus starts off in the nulled software and then spreads to the rest of the website, and also to other websites on shared hosting. 

The wp-vcd malware infection creates spam links on the infected website, fake admin users, or shows spam ad pop-ups to website visitors. It does this to drive traffic to spam websites or increase their ad revenue. 

How to remove WP-VCD wordpress malware?

The most effective way to remove wp-vcd.php malware infection is to clean your WordPress website with a security plugin. You can also remove the malware manually, but it is a difficult and time-consuming process with very low rates of success.

Karishma,

Karishma was an engineer in a former life, and so she specialises in making tech more accessible through communication. When she isn't writing, Karishma spends her time tinkering in the innards of WordPress websites

Copy link
Powered by Social Snap