hacked site, altered php files, revslider
-
I have multiple sites which seem to have been hacked similarly. When you login or make a page change, some % of the time it displays the correct page, like the dashboard, but will also launch an alternative malicious spam page, like the ones warning you that your PC is infected and you need to hire someone to fix it.
I have been unable to find the hack and multiple WP security programs don’t detect the altered php scripts.
Recently for a different issue, I installed CXS to monitor the server and it has started to find things that must be related to the issue. Here are some examples:
Web upload script path : /home/friedges/public_html/wp-admin/admin-ajax.php
Web upload script URL : https://friedgeslandscaping.com/wp-admin/admin-ajax.php
Remote IP : 104.197.168.171
Deleted : No
Quarantined : Yes [/home/quarantine/cxscgi/20170427-042407-WQG4t63AfiIAAAusbREAAAAb-file-3m54DJ.1493285048_1]———– SCAN REPORT ———–
TimeStamp: Thu, 27 Apr 2017 04:24:08 -0500
(/usr/sbin/cxs –nobayes –cgi –clamdsock /var/clamd –defapache nobody –doptions Mv –exploitscan –nofallback –filemax 10000 –html –ignore /etc/cxs/cxs.ignore –mail root –options mMOLfSGchexdnwZDRru –qoptions Mv –quarantine /home/quarantine –quiet –sizemax 500000 –smtp –ssl –summary –sversionscan –timemax 30 –nounofficial –virusscan /tmp/20170427-042407-WQG4t63AfiIAAAusbREAAAAb-file-3m54DJ)
‘/tmp/20170427-042407-WQG4t63AfiIAAAusbREAAAAb-file-3m54DJ’
(compressed file: revslider/db.php [depth: 1]) Known exploit = [Fingerprint Match] [PHP Exploit]Web upload script path : /home/wurdeman/public_html/blog/wp-content/plugins/wp-symposium
Web upload script URL : https://wurdemann.org/blog//wp-content/plugins/wp-symposium/server/php/index.php
Remote IP : 163.172.108.226
Deleted : No
Quarantined : Yes [/home/quarantine/cxscgi/20170427-032336-WQGqiK3AfiIAACJtGeQAAAAC-file-rXTbsU.1493281416_1]NOTE: This alert may be a ModSecurity false-positive as /home/wurdeman/public_html/blog/wp-content/plugins/wp-symposium does not exist
———– SCAN REPORT ———–
TimeStamp: Thu, 27 Apr 2017 03:23:36 -0500
(/usr/sbin/cxs –nobayes –cgi –clamdsock /var/clamd –defapache nobody –doptions Mv –exploitscan –nofallback –filemax 10000 –html –ignore /etc/cxs/cxs.ignore –mail root –options mMOLfSGchexdnwZDRru –qoptions Mv –quarantine /home/quarantine –quiet –sizemax 500000 –smtp –ssl –summary –sversionscan –timemax 30 –nounofficial –virusscan /tmp/20170427-032336-WQGqiK3AfiIAACJtGeQAAAAC-file-rXTbsU)
‘/tmp/20170427-032336-WQGqiK3AfiIAACJtGeQAAAAC-file-rXTbsU’
Known exploit = [Fingerprint Match] [PHP Shell Exploit [P0324]]****************
NOTE: In the above case, it looks like it installs a plugin and note the “//” directory link. It appears to install a plugin, run it, and then delete it. I have no such wp-symposium plugin.Can the whole wp-admin directory be replaced? Is there any install altered files in that directory. I don’t know if that will fix it, but I am going nuts. Thanks!
- The topic ‘hacked site, altered php files, revslider’ is closed to new replies.