Detecting an infection so you can respond quickly is just as important as protecting against attacks
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtd3l5QzW5BW0B06lZ3mSW57g_2d6bkq30W6MS2sD41gj1RW2m9hHp4X7XJGVWshz35dKV6xW5GhBrh5pt4WjW77vz_c1Jx5qxW3GwjG91xj1TSW4Hr2m04Pq6C1W5B-x2P4jPpjjW1NmXZX7ntK9yW51mHtT3b_814W5K4p5p4hlZLZW9lPMMl2CMJgwW9fz7dm9jrgZfW1Jq4zd2WpDVrN4P43q_l_DtxV3k1gS4RVYGXW8Y7Hsb2BDvY4f1Wr02d04 )
FeaturedImage_Wordfence_36.101 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
Wordfence recently launched Wordfence CLI (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3p_MPtpQpl1QQWW5f0J-J8H7Km6W6ysqs24-j-bVV9KrHY8Z4Gg_N6-nY1Dd02zFW6T0T2D1fzJSgW1VC7287PgZ41F3fshn3yL5SW1vSpfM4k208VN1HBBskl1yVmW8g5YQK8-CMV4W3tGbGZ63GsXqW1sfC7l8mjTszN1BmXHcxRZkVW374ytJ3yqjwkVRBxXV1dQ26BW4MQmQ334Wwx2W4-BtLF2bBDvPW1L2-LG3r47wbW7CmrYf1MvC3mW86TRxr2dFw6gW38-80g7sffRBf6rqG7v04 ) , a high performance command line malware scanner, which makes use of our extensive set of malware detection signatures to rapidly scan file systems for infections.
In recent years, the WordPress community has seen a shift in emphasis towards prevention, rather than detection, of security incidents. This reflects the increased adoption of best practices such as Multi-Factor authentication, vulnerability management, and configuration hardening.
While we agree that prevention is always better than detection or remediation, one important concept in Cybersecurity is defense-in-depth, so it’s important to have a well thought-out incident response plan and adequate security monitoring in place. No security solution provides perfect protection against zero-day vulnerabilities, and even a fully locked-down site can be compromised if it shares resources with other sites that remain vulnerable. In today’s article, we’ll discuss our philosophy for securing websites, including several key cybersecurity challenges and concepts and how they relate to the case for malware scanners.
READ THIS POST ON THE BLOG
(
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
AdobeStock_640064012 copy (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
Security Should Serve Users, Not the Other Way Around
There’s an old saying that the best camera is the one you have on you, and likewise, the best security solution is the solution you’ll actually use. Users add to the complexity of securing systems, and it is easy to secure a system that nobody wants to use because it’s locked down. Security that’s easy to use and difficult to bypass is far better than security that’s difficult to use and impossible to bypass, and one guiding philosophy to cybersecurity is that nothing is truly impossible to bypass.
That’s why Wordfence prioritizes the user experience and strives to incorporate as many layers of security as possible into a package that’s easy to use for the vast majority of WordPress site owners. Traditionally this has meant plugin-based offerings. Despite the limitations of running security as a plugin, our many features including our Web Application Firewall, Two Factor Authentication, Real-Time IP Blocklist, and Malware and Vulnerability scanner help secure over 4 million sites, detect millions of malicious files, and block billions of attacks each year.
In our 2022 Wordfence State of WordPress Security Report (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3p-W259KM_2lkg0BW9cZ7XD88CCL3W9bnKM43S2T3vW4TZmzC7VMn2XW8BCt_Y2pkdtRV1xZN-76cHSsW6Ql3M052HmB-W32Pc642DL33NN1RdtkC7CF0VW1zt0986yJfq2Mh-DTP71vXZW8ty5Hy20pFm4W22c-y_2yl7ljW5cXxnf7JC_QxW2llF9s2nKz9KMvJDF3rnTxHW1_h3Vv28VBZZW7m6lQj5Yvt5nW7jCrPG3g3r6FW6C98RS7G_jr3W1nyJNM7ZrGY3W39BjvP5bXm3cW3GD84y47NSsKVxv-2R2Vwd4dW9dQVMk6NfbBNW4F0Cq421HX94f2dr_7P04 ) , we reported that our firewall blocked more than 159 Billion credential stuffing attacks, 23 Billion configuration scans, and about 12 billion attacks against vulnerabilities. You can also get a real-time view of the volume of attacks we are blocking on the Wordfence Intelligence Dashboard (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtx3l5QzW69sMD-6lZ3kXW1nSSHD2QZlkzW3LWkQw4PCX-7W7xJ14C7-p1j7W4vvfKG3KcYH3W6xgFF-6C6D9VW8CsNz73fkbs6W6xxHz25P6LqrW8rZ5TR66ZpgpN7q-mJg810vnW7kgww88-yQFKV83VxS4GDrZZW77038J6TqT3hW2_FG3D236lbdN3TWDwsJcxs8W7cfTtm3HZXd9W4LfLVn8JTqQLN6FqPzt_CjyPVy2sGG6lR612W6dwwG21kDmPVW3Wl3x24bth2Gf2lghrv04 ) .
AdobeStock_556584137 copy (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
Assume Breach Mindset
While it might seem pessimistic, “assume breach” is a critical mindset in cybersecurity that involves planning mitigations in case a site is compromised. For many sites, even the most locked down ones, compromise is a matter of when, not if, and rapid detection is key to minimizing the damage. If your site has been compromised, it is important to find out as soon as possible to prevent the attacker from gaining ground and elevating privileges throughout the system. A well thought-out incident response plan is useless if you’re unaware that an incident is occurring.
The Solarwinds breach, for instance, remained undetected for more than a year, allowing threat actors to infect thousands of critical systems via a supply-chain attack. With adequate security monitoring and detection in place, this year-long infection could have been detected much sooner and impacted far fewer systems if detected earlier. This also highlights how even those striving to put forth the best security may still have gaps in coverage where an attacker can breach defenses.
AdobeStock_556584108 copy (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
Layered Security
No single solution will ever be perfect, and it is not possible to completely eliminate risk, only manage it. One of the most effective ways to manage risk is to layer defenses so that bypassing any one layer does not allow an attacker to take complete control. This is why, for instance, it is important to use both strong passwords and multifactor authentication, and why backups are important but not a replacement for intrusion detection.
Another example of this is the contrast between Cloud-based solutions versus our Web Application Firewall - a Cloud solution would be well-suited to providing DDOS protection and blocking some generic attacks, while our WAF benefits from running with the plugin because it can block attacks specifically targeted against WordPress vulnerabilities without unnecessarily blocking legitimate administrative traffic.
Our team has deployed hundreds of firewall rules that take advantage of our Web Application Firewall's unique capabilities. Many of the privilege escalation and authentication bypass vulnerabilities we see have parameters and values that require specialized experience and techniques to adequately block. For instance, many privilege escalation vulnerabilities, such as the one we found in the JupiterX Theme (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhw03l5QzW95jsWP6lZ3lXW7LvhjQ916RCKW7NNYh57M5BvPW8--8734Y_cxbW5Tf6hT9bjc0sW1F3jGV4cjxPfW1ZvLFW3tpRlyW7wqZRn60gXhNW1tmlQM51Tm-zW5G83b19jCTV9VKpjbj45BcwbN521bWXQg-V3W5TZ3rr3-sr_4W9lyrX8143nfpW8Ph-207qQJyJN3Pcnmn_wfwwW6n1s3s6nYrQ7W7tPbr94wqRkPW88mgdw5XSv9qW31-3CB3TLTTyW92HTGg5gX7Y2VcQDPp6Fn8gwW4Lpl-c6LvG2TW8mJkr38-MT4_W6jb6sy500yr4W6VFHt597D976W7xtK7g7rqWt2N7ZqdjcLKrVkW1K_-fG52NPb2W1HCVGB32XDH-V4zvx48DHMQ6f7pcW1l04 ) , make use of administrative functionality that has been accidentally exposed to low-level users, often via an AJAX action.
With a generic ruleset from ModSecurity attacks of this type couldn’t be blocked without entirely breaking most site functionality. Even the most advanced cloud firewalls able to scan POST parameters by terminating TLS at the edge would still prevent administrative users from performing necessary tasks. Thanks to our custom firewall rules, the Wordfence firewall is able to easily block malicious traffic without impacting site functionality, and thanks to our in-house vulnerability research we’re often the first to release firewall rules for new critical vulnerabilities.
AdobeStock_556584151 copy (1) (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
Trusting Trust
An often overlooked concept in cybersecurity is the problem of “trusting trust.” On any given system, an attacker that can run code can tamper with any other code running at the same privilege level. This is often used as an argument against plugin-based malware scanners and admittedly does present a challenge since any attacker able to compromise a site to the point where they can execute code can run that code at the same level as a plugin.
Many of our users install Wordfence after they have become aware of a breach and successfully use our scanner for remediation. Most malware is still not sophisticated enough to evade detection in this way, and even malware that is designed to do so often fails to fully hide its tracks from detection. Additionally, based on research our team has done on WordPress threat actors, many are unwilling or unable to develop their own evasion payloads or pay the premium for off-the-shelf solutions.
Nonetheless, such tampering is becoming more common, and no plugin-based scanner is immune to it, but our plugin-based scanner still reliably detects an enormous amount of malware and we have the telemetry to prove it - roughly 1 million sites successfully used Wordfence to clean malware in 2022, based on the total number of sites we saw infections on compared the number of sites that remained infected at the end of the year.
Fortunately, even the most cleverly designed file-based malware can’t successfully hide from a scanner it can’t tamper with, and Wordfence CLI is an effective solution for sites that need this extra layer of detection.
AdobeStock_556584101 copy (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
Responsible Remediation
When it comes to remediation, a one-size-fits-all approach simply doesn’t work. Many sites have unique needs, custom code, or technical debt. Replacing core WordPress files and plugins with known clean versions can fix many issues, and our scanner offers the option to do this, but many infections will simply reoccur if the root cause is not addressed. Tools to automate remediation can be incredibly useful, but fully automated remediation can cause more problems than it solves while providing a false sense of security - there should always be a human making final remediation decisions. This is why our Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3krW2Bdbzm1kSpfTW7hMpxN2r_cc9W2mrGWc5WJ1FJW4SZ4FL7j7qrLW2FH58b5VQ9FsW428XcG3Fp4wXW7-qv_g55G8X3Vf4stc37S8sDV6zJ402yWzxwW5-kR9l3Pc4rcW7nqwkb5nnL_bN6mtrLhMRp8YW81ZV2Z28ZVDJW8pFwLF8vY3ttW1DzCWr8P8s5pW1yTdlB32LFxyW8dfdmS3sf8y0W6wFgKw9d2xxxN5PLTrhJt9TDW4LvWsr8TPThVW8Y5H7p2_SRMGVNrJKW6v-FPFf8rGHyv04 ) and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3nJW8Vk80K4W342ZW3MBYnB3DMlXZW23wnZt2m0jJGW4f1NDd5CMKYXVQ5jgz58n3H1W6T0Zyb7rBmzSW78B5yl4bWXlGVbxQS66lvcghW8Znfg05TVpSLN6KqG1GB37bcW8Hr66_1LKNg3W5m20l01yWLP-N8nffvV2w8bCW2QMKWZ6984vHW5g-r-H1K16QFW6_gdwY4lpdHYW37Jt-Q3XpjrdW561tMV7b7sNNW700ssW1sRF1WVVjgsl8j-g1SW1LVjpj1lj_-NW5Vdkn22XR9CYf36r0hT04 ) offerings use skilled analysts to clean your website and get it back into working order, and we highly recommend these services to less experienced site owners, or site owners who simply want to trust the experts to handle remediation.
AdobeStock_640063982 copy (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhvq3l5QzW7Y8-PT6lZ3nhN82Nmmmt93JMW8drD4X83nwWjN2HgK-98jd_HW92rJWq6B3SmHW4hF0n-1pzMzsVlJ9Qr7SrT02W5zk1-w18qN00W26rlGS2bVZcgW5NZBwl1tzr65W4K7v3V1zLMzHW1qxYZB5dz4LbF2g74WvGHJYW1Hqxlg8h92MtW6d7Lh75ShC83N6VF-pdrS2rpW8VLkY815yqrnW6b9gQm4rNtz-W2DC5G62GKSb7W3QT9QD5Vm3pYW3vGr4-1HBkS6W45RGfR8_6-22W6kq5T53lCXkrW9fRbKq5FX8xDW8rZHgb7f6_MGN6rdrwKj3krzVCnRpr6301Hqf3HwNQ204 )
Continuous Improvement
Our malware signatures are designed to detect not only active infections but also artifacts generated by malware and other indicators of compromise. Our team of specialists constantly monitors new malware variants and we release dozens of new signatures every month to keep up with attackers. Since our signatures use carefully crafted regular expressions, each signature can detect thousands and oftentimes even millions of unique malicious files.
In the spirit of continuous improvement, we’ve launched an additional, user-friendly layer of security with our Wordfence CLI (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3p_MPtpQpl1QQWW5f0J-J8H7Km6W6ysqs24-j-bVV9KrHY8Z4Gg_N6-nY1Dd02zFW6T0T2D1fzJSgW1VC7287PgZ41F3fshn3yL5SW1vSpfM4k208VN1HBBskl1yVmW8g5YQK8-CMV4W3tGbGZ63GsXqW1sfC7l8mjTszN1BmXHcxRZkVW374ytJ3yqjwkVRBxXV1dQ26BW4MQmQ334Wwx2W4-BtLF2bBDvPW1L2-LG3r47wbW7CmrYf1MvC3mW86TRxr2dFw6gW38-80g7sffRBf6rqG7v04 ) scanner. While it is designed for power users and administrators, it unlocks new possibilities for detection that were not available with our plugin scanner.
wf-stacked-commandline-1024x901 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3p_MPtpQpl1QQWW5f0J-J8H7Km6W6ysqs24-j-bVV9KrHY8Z4Gg_N6-nY1Dd02zFW6T0T2D1fzJSgW1VC7287PgZ41F3fshn3yL5SW1vSpfM4k208VN1HBBskl1yVmW8g5YQK8-CMV4W3tGbGZ63GsXqW1sfC7l8mjTszN1BmXHcxRZkVW374ytJ3yqjwkVRBxXV1dQ26BW4MQmQ334Wwx2W4-BtLF2bBDvPW1L2-LG3r47wbW7CmrYf1MvC3mW86TRxr2dFw6gW38-80g7sffRBf6rqG7v04 )
More Flexibility with Wordfence CLI
One of the most frequent requests we’ve received over the years was the ability to run scans programmatically via the command line rather than via the plugin. Not only does this mitigate tampering concerns and result in a massive performance boost, but it also allows for extended use cases - you can use it to scan backups outside of the webroot to ensure their integrity before restoring them, or to more thoroughly scan for database infections by running it against database exports, since scanning live databases tends to be extremely resource-intensive. You can use it to quickly scan just files that were recently modified by piping the results from the Linux find command to the Wordfence cli scanner, or exclude signatures from the scan in the rare cases where your custom code is detected by one of our signatures.
Wordfence CLI (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3p_MPtpQpl1QQWW5f0J-J8H7Km6W6ysqs24-j-bVV9KrHY8Z4Gg_N6-nY1Dd02zFW6T0T2D1fzJSgW1VC7287PgZ41F3fshn3yL5SW1vSpfM4k208VN1HBBskl1yVmW8g5YQK8-CMV4W3tGbGZ63GsXqW1sfC7l8mjTszN1BmXHcxRZkVW374ytJ3yqjwkVRBxXV1dQ26BW4MQmQ334Wwx2W4-BtLF2bBDvPW1L2-LG3r47wbW7CmrYf1MvC3mW86TRxr2dFw6gW38-80g7sffRBf6rqG7v04 ) is open-source and can be fully customized or forked, and while our basic Free signature set may not be used for commercial purposes, it is designed to detect the most widespread indicators of compromise found on more than 90% of all infected sites. Bear in mind that most infections involve multiple malicious components, so for more comprehensive scanning and remediation, we recommend our Commercial signature set which detects more than 18 million unique malware variants in the wild.
Conclusion
In today’s article, we discussed some key components of our strategy for securing websites, including user experience, layered security, the assumption of breach, the problem of “trusting trust,” responsible remediation, and our drive for continuous improvement. Our goal is to provide the best security possible for your website, and that means providing security you’ll actually use.
While no single solution offers perfect protection, Wordfence offers prevention, detection, and remediation packages that will significantly improve your security posture while remaining compatible with other solutions. With the launch of Wordfence CLI (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3p_MPtpQpl1QQWW5f0J-J8H7Km6W6ysqs24-j-bVV9KrHY8Z4Gg_N6-nY1Dd02zFW6T0T2D1fzJSgW1VC7287PgZ41F3fshn3yL5SW1vSpfM4k208VN1HBBskl1yVmW8g5YQK8-CMV4W3tGbGZ63GsXqW1sfC7l8mjTszN1BmXHcxRZkVW374ytJ3yqjwkVRBxXV1dQ26BW4MQmQ334Wwx2W4-BtLF2bBDvPW1L2-LG3r47wbW7CmrYf1MvC3mW86TRxr2dFw6gW38-80g7sffRBf6rqG7v04 ) , it is now possible to scan hundreds or even thousands of sites with a single, competitively priced license, all while conserving server resources.
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtx3l5QzW69sMD-6lZ3kVN2Jt9p6T79XVV2fptJ6RJLfzVFLSt356L3JRW4lY42x79khj_W4zhsyW7Kp9Q5W5JHhyC8Lc4_0W4G3pBw6rDgD0W1mgTFn3DjT9RW1P579G5-mZlyW1WQvbH32HXN5VCtwFQ1d3597W3c2qpQ1Pfk94VPy5Nr93wbyGVRGjPt1GB9NJVbBjmn7vSg0FW9hRCjd5WJY3YW6WmFF38cRV2kW945Rnp3pHqRyW5by-lH8lkTWgW1skZnL2LJ9-Vf8rR5zM04 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3nJW8Vk80K4W342ZW3MBYnB3DMlXZW23wnZt2m0jJGW4f1NDd5CMKYXVQ5jgz58n3H1W6T0Zyb7rBmzSW78B5yl4bWXlGVbxQS66lvcghW8Znfg05TVpSLN6KqG1GB37bcW8Hr66_1LKNg3W5m20l01yWLP-N8nffvV2w8bCW2QMKWZ6984vHW5g-r-H1K16QFW6_gdwY4lpdHYW37Jt-Q3XpjrdW561tMV7b7sNNW700ssW1sRF1WVVjgsl8j-g1SW1LVjpj1lj_-NW5Vdkn22XR9CYf36r0hT04 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3nyW70d-Ch4g8JX2W3Cy3X02XPFmFW3jQK9s8PRTvZW7_F4pH4ZwwjJW5MDxD17k2LbkV_DsmW4M5-YJW8mkCZy5q07blW5gp-r06hZJzlVzmv9Y6744jbN3qKlNXjx34gW1xL-3p1jcsSJW8JcSXv8L5LxVW8y4Mfl71wg_gW49WrsR1Q8KtKW737N421_m2t0N5p_6GzM6FFjW57dcyL77TVvXN32c8PRSTj31W4Txb5l1zzmnsW5h85Sh8LrknPW1Y7_Zl38yVv_W3ChMy57PhDCMf5lLF-s04 )
wf-stacked-commandline-1024x901 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtR3l5QzW6N1vHY6lZ3p_MPtpQpl1QQWW5f0J-J8H7Km6W6ysqs24-j-bVV9KrHY8Z4Gg_N6-nY1Dd02zFW6T0T2D1fzJSgW1VC7287PgZ41F3fshn3yL5SW1vSpfM4k208VN1HBBskl1yVmW8g5YQK8-CMV4W3tGbGZ63GsXqW1sfC7l8mjTszN1BmXHcxRZkVW374ytJ3yqjwkVRBxXV1dQ26BW4MQmQ334Wwx2W4-BtLF2bBDvPW1L2-LG3r47wbW7CmrYf1MvC3mW86TRxr2dFw6gW38-80g7sffRBf6rqG7v04 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtx3l5QzW69sMD-6lZ3lpW2smBFQ2Jnmk4W7p1vJ05DBPQqW8klYZr2Xk4DGW4V7y6X3-KHBFW7yv5T78jD283W5GZc4M8Rp7tPW1XhTHn4RwxZ9W7GTP8t8W2TRDW12Xx5w3wZ5-nW6YXSwk4R3-qbW6GQxbr1HCjw1VX5n2Q5q9t0FW8xbXZN6W1nb9W9fCnqL5kgH0pW874r_q4gCdmmW6ZDr9v1XM-bxW2BllGM98tHJ9W2JzFLl4hKbm6N47K3Cm3fptcW22zkT-7QZ5cYf3DZPds04 )
wf-intel-footer (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtx3l5QzW69sMD-6lZ3mVN1RChkCVZCX_W1mdvyR61k0Z1W4JHJW14pB2hZW4zV1Mn3kDbJ6W28nbk-8P9G5MW5NyjZx6PKp7YW66z6dg1LZHjSW5_jPQG66Src7N5l1xTRJrdHKW2nFSHg7DDdRBW3N9L0y39SFqmW79M_HB2nJcw2W6XZpgL4cfGyJW9bYq5N6FHx0mW7d2LsX4n3vDMW1B3tkL59w422W61p8M_68Y0lZW6nhQ1r1MbQ7pW14pf-j5MNygSW7X-9l18D4L_9f5wgJBF04 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VX8Fzt8gdR0kN1SGWWKmPCLwVNrtzX53n_tcN1TFhtd3l5QzW5BW0B06lZ3l0W7zzZTb3c9zf-N7ckrlfh7qBQW1q70FX1kwWScW3klTs_7Y24bTW8MdJTl4Rdn8-W3c45C58yTBKrN1BbVxVS6Tb0W75fvCr5jQ5YKW2sKPKk97FCNZVjxw1F6hLgQgW34d_FM1-k9zmW7j_9yg4y6Hn1N1MNhc4JM4wJW2q-RdJ47ggpSW3LVVsP3-7FHjW7Z9P295thm9NVJX5Tz8Mx3_kW709LBm4njZtJf4VptZl04 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFdpW8B4Gkg741TGXV25vNx5XfyFnN5W_5hcWL_FZN96C2pxXk_7QVbw4bR6M8VYMW4x6YMG9dpKkjw8rKxnv29Z2&v=3&_hsenc=p2ANqtz-_WUG23I8kaqqcFasM2P368tpmZ4UBOvfJKj5fxbhh8Q4coCcrEy9UDxoWSnHtBbByFo7dnpJeZCtzUUT3B0tVNkLTJVQ&_hsmi=274111172 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFdpW8B4Gkg741TGXV25vNx5XfyFnN5W_5hcWL_FZN96C2pxXk_7QVbw4bR6M8VYMW4x6YMG9dpKkjw8rKxnv29Z2&v=3&_hsenc=p2ANqtz-_WUG23I8kaqqcFasM2P368tpmZ4UBOvfJKj5fxbhh8Q4coCcrEy9UDxoWSnHtBbByFo7dnpJeZCtzUUT3B0tVNkLTJVQ&_hsmi=274111172 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Wed Sep 13 2023 - 17:51:31 CEST