Hacker using backdoor from WP Jobs??
-
I manage a site using WP Jobs manager and a few weeks ago it appeared a bot was posting spam jobs, which was caught during approval process, so I used WP job manager code to create a recaptcha and block it. The client has since been targeting with phishing and a human hacker created a job posting and uploaded some kind of malicious image for company logo. I deleted the bogus job, the employer account, image and used wordfence and my hosting company to clear out all ‘infected’ files. However it appears the hacker can still upload malicious files (jpg, gif, txt) into uploads/company_logo/2016/07 folder. Anyone have experience with this? The hacker still has some backdoor and appears to hit domainname.com/jm-ajax/get_listings/ and domainname.com/jm-ajax/upload_file/ Not sure what those links are or how to disable them. Really would like to remove the code allowing them access, but don’t know where to look since wordfence can’t identify anything. All my plugins and theme are up to date. Using Avada.
Thank you!
- The topic ‘Hacker using backdoor from WP Jobs??’ is closed to new replies.