• The hack shows up in IE and Safari but not in Chrome. I searched my database and all my files for viagra but I can’t figure out where the hack is. This is the HTML that is there. Our site is https://www.chihuahua-rescue.org

    <div id="page" class="hfeed site">
    		<div id="site-header">
    		<a href="https://www.chihuahua-rescue.org/" rel="home">
    			<img src="https://www.chihuahua-rescue.org/wp-content/uploads/2014/06/Header2.png" width="1260" height="240" alt="">
    		</a>
    	 REDACTED
     </div>

Viewing 15 replies - 1 through 15 (of 33 total)
  • JenR

    (@jennifer-roberts)

    Thread Starter PaulHanaki

    (@paulhanaki)

    Thanks I did the two security check and it says it is ok. I am talking with the person that the hack is link to and he has no idea why it is linked to his site and he seems to be a reputable photographer.

    Does anyone know where that <div id=”page” class=”hfeed site”> section is pulled from within WordPress? I could look at the files if I knew where that is.

    Hi. Is there help for someone who knows NOTHING about computers other than how to update blog posts, etc?

    Everything I see is very technical, and I’m clueless. My site’s compromised, and I can’t figure out how to get it fixed. I started doing the Google fix, and it says to find the errors and fix them.

    Yeah…but how? Is there something WordPress can do to help un-infect my site for me?

    Any suggestions/referrals appreciated. My site is: lynnrush.com and it’s getting redirected to porn! (yeah, and some of my readers are young readers….not good)

    [ Redacted, please do not post your email in these forums ]

    Thread Starter PaulHanaki

    (@paulhanaki)

    Lynn your site did not direct me to any porn. Maybe that is just your computer that is having issues. Not sure why you have young readers as the books look like for older women.

    JenR

    (@jennifer-roberts)

    @lynn, if you need additional help, I’d suggest checking out Securi or you could post a job listing here:

    https://jobs.wordpress.net/

    These are totally volunteer forums, so there isn’t any help other than what people can advise here. Also forum policy that help be kept here so the community can benefit from conversations and to avoid the forums from becoming a spammy mess :).

    Thank you so much JenR. That’s exactly what I was looking for! I had no idea where to turn for IT help. I found a fix through GoDaddy support, but it’s a bandaid. We found it was the mobile side of my wordpress site that was hacked. So, using a phone/iPad, you would type in Lynn Rush and it would show a porn address. Now it shows my site, but it says “Site may be hacked”

    UGH. I throw a curse on hackers…. LOL. Thanks again for your help. I now have a direction to find some help. ??

    ~lynn

    JenR

    (@jennifer-roberts)

    @lynn – you’re welcome but I’m sorry you’re having to deal with this at all. Hackers really are horrible. Good luck with it.

    Thread Starter PaulHanaki

    (@paulhanaki)

    Ok I have finally figured out the file they hacked. It appears they hacked all of the theme and overwrote the functions.php at the top they added

    $wp_user_functions_init = create_function('$a',strrev(';)a$(lave'));
    $wp_user_functions_init(strrev(';))"

    with about 1,000 random characters after that.

    and end with

    (edoced_46esab(lave'));
    ?>

    Does anyone know what that is? I have no idea how they did that. The only reason I found it was because the theme dates were all the same except that one which was dated Dec 1

    @paulhanaki The link is to a genuine site that has been infected with malware.

    https://sitecheck.sucuri.net/results/www.markcallenphotography.com/viagra-cost-compare/

    Thank you @paulhanaki, this helped me, I had the exact same problem, please let me know if you find out the source…off to go add some malware filters

    I had the exact same issue. Site was hacked on Dec. 1st, 2014 with same code inserted into functions.php file.

    Were you able to find the source of the issue? Has it returned for you at all?

    Could you guys provide a list of plugins , your theme as well as the version of WordPress at the time of your site being exploited?

    Thread Starter PaulHanaki

    (@paulhanaki)

    @sheenalevi,@ClearPeach I never did figure out the source. It has not returned. I did change all my passwords after I cleaned up the functions. I did figure out it was reverse base64 encrypted.

    @justingreerbbi I was running 4.0 It auto updated to 4.01 but I am not sure of that date. The date of the hack looks like December 2nd as that was the date of the file change.

    Plugins bbPress, Contact Form, Easy Table, Fourteen Colors, Fourteen Extended, iframe, Jetpack by WordPress.com, MOJO Marketplace, Simple Custom CSS, Simple Responsive Slider, Smooth Slider, W3 Total Cache, Wiki Embed, WordPress Importer and something called Hello Dolly that I don’t know how it got installed but I deactivated it.

    I have the same issue described by @paulhanaki. I have 66 WordPress sites and 3 of them were altered on December 1, 2014. (I teach an intro to WP class and every student has 3 sites they work with each, which is why I have so many.)

    I assumed this code was introduced by a security breach in either a plugin or through the MOJO Marketplace install which I just noticed leaves files in the site root.

    All of the sites have a common username (admin), but they each have different and unusual passwords from each other.

    All of these sites have only the following plugins in common:
    Akismet
    Contact Form 7
    Duplicator
    Google Analytics (Yoast)
    NextGEN Gallery
    W3 Total Cache
    WooCommerce
    WordPress SEO (Yoast)

    They were all installed from a Duplicator backup of the original MOJO Marketplace installation of one of the sites (and that original site has not been hacked at this point). I do not have nor use the MOJO marketplace plugin, however, there is the issue of those MOJO files sitting on site root.

    And similarly, the harmful code in functions.php creates a link to a different real site that appears in the header of the student sites. Oddly, the code creates a different link for each one of the infected sites and those links link to an existing site that previously had malware on it, but has since been cleaned.

    Although I remove these sites at the end of the month, completely deleting their databases and all related files from my server, I’m concerned that students who made backup of these sites may be exposed to a hacking later if they restore them on their own servers.

    If I run across any other useful information, I’ll pass it along here.

    @paulhanaki Thanks for providing the list of plugins. I am like to keep a list of plugins and cross ref with other encounters to see which plugins surface more times than not.

Viewing 15 replies - 1 through 15 (of 33 total)
  • The topic ‘I've been Hacked and need help’ is closed to new replies.