Wordence find backdoor in my website
-
Hello,
Sorry for my english i’m french but this forum is the only with can help to resolve a problem.
My website have been a lot of attack there is more than 6 month. Now, i use wordfence and this plugin help me a lot. Recently when i looking for the analyse the plugin find “backdoor” in my website. I make a copy of this code and i hope that someone here can tell me more about this. is it dangerous? What can i do?
Thank you for your help.
Filename: wp-includes/compat-functions.php
File Type: Not a core, theme, or plugin file from www.remarpro.com.Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: <?php\x09$p=$_COOKIE;(count($p)==23
The issue type is: Suspicious:PHP/cookie.count.8285
Description: Suspicious code often found in malwareFilename: wp-admin/includes/comment-edit.php
File Type: Not a core, theme, or plugin file from www.remarpro.com.
Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: if($_POST[‘opt’] == ‘chmod’){\x0aif(isset($_POST[‘perm’])){\x0aif(chmod(The issue type is: Backdoor:PHP/Generic.153
Description: A malicious file uploader known as Genericwp-config.php
File Type: WordPress Configuration File
Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: include_once(ABSPATH . ‘/wp-includes/init.php’The issue type is: Backdoor:PHP/rogueinclude.6167
Description: Malicious include of a file disguised as coreThis is your main configuration file and cannot be deleted. It must be cleaned manually.
Filename: wp-includes/init.php
File Type: Not a core, theme, or plugin file from www.remarpro.com.
Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: array(‘function’,’variable’,’document’,’cache’,’create’,’load’);\x0d\x0a\x09\x09$markers=array(\x0d\x0a\x09\x09\x09\x09$labels[4],\x0d\x0a\x09\x09\x09\x09$labels[0]\x0d\x0a\x09\x09);\x0d\x0a\x09\x09$factoryName=join(‘_’, $markers);\x0d\x0a\x09\x09$param=’$’;\x0d\x0a\x09\x09$param.=’mime’;\x0d\x0a\x09\x09$pa…The issue type is: Backdoor:PHP/joindictfunction.6820
Description: Include at the beginning of the wordrpess index – often used by malware, occasionally benign
- The topic ‘Wordence find backdoor in my website’ is closed to new replies.