Viewing 10 replies - 46 through 55 (of 55 total)
  • @ sanjeevmohindra

    PS: You don’t need to be register to put the comment there..:)

    My bad, all I saw was something about ‘log in to reply’. So I just came back, sorry.

    Thanks Mickey for the suggestion. In fact I was thinking of removing domain name because I am not sure attack comes only from that domain.

    IP I am sure and I have checked log on my server to confirm that also.

    Any how its better to use as you suggested, I will change it on my guide.

    Plus I believe deny based on host name requires the server to work harder then doing it my suggested way.

    Here is another way you could possibly do it as well, including the other two known domains in question. Difference is no need for the ‘(www\.)?’ as leaving it out almost achieves the same effect, ‘[^.]?’ assumes any character or not after superpuperdomain (someone can correct me if I’m wrong), and I removed the ‘com’ to cover all domain suffixes.)

    SetEnvIfNoCase Referer ^(superpuperdomain[^.]?|newportalse|counter-wordpress)\. ban
    order allow,deny
    deny from 91.220
    deny from 91.196
    deny from env=ban
    allow from all

    Not sure how much good these rules will help if the attack is using a sock and they can change their domain name and IP. I guess it could help and really wouldn’t hurt anything to use them, unless you really want that traffic from those IPs & domains and you believe it’s worth the risk. For me, I choose to be safe than sorry and I will take the chance on loosing that traffic. ??

    Thanks alot CupRacer, your guide worked like a charm!

    @ MickeyRoush

    Yes I completely agree with you, better safe than sorry. I am also ready to loose the traffic from these server, as long as my sites are safe.

    Also sorry about my comment, after you mentioned I went back and checked and indeed that little stupid checkbox was ticked. So it was asking you to log in. It will not do that again…

    I always open my sites for comment and thought I did the same for this new domain also….

    Hello all, I am having this problem right now on my site: https://kitchen.amoores.com

    I have found one of the files mentioned on this thread, the upd.php file and have deleted it.

    I haven’t been able to find any of the other files mentioned though.
    When I scan my site on https://sitecheck.sucuri.net/ this is the message I get.

    Malware found on javascript file:
    https://www.kitchen.amoores.com/wp-includes/js/l10n.js?ver=20101110
    Malware found on javascript file:
    https://www.kitchen.amoores.com/wp-includes/js/jquery/jquery.js?ver=1.6.1

    Should I delete these two files? or just the section of code listed on that scan?

    @ JeanetteM

    You can check the removal process here, reinstall of wordpress from the dashboard should take care of these two files, but make sure you clean you wp-config.php file if infected.

    Thank you! I will try reinstalling wordpress and your other suggestions. I will let you know if it works.

    I have worked with HostGator and done the steps mentioned above to rid my site of malware. I am no longer getting the warning screen when logging into my wp-admin. Scans through https://sitecheck.sucuri.net/scanner/ are clean.

    However, now when I log in to a plug-in running on the site, I get the warning screen. {https://blogboutique.com is fine and https://blogboutique.com/wp-admin is fine; however, https://blogboutique.com/dap/admin shows “Suspected Malware Site” in the google bar and causes the warning screen to come up.} Running this URL {with dap/admin through the sucuri scanner comes out clean.

    I’ve tried to have my site reviewed by Google. However, Google shows no malware on the site and has not blacklisted it, so there is no option for review.

    I have only ever gotten the warning in Safari and Chrome ~ Firefox has been fine.

    Any thoughts or ideas? I’d really appreciate it!

    @sanjeevmohindra, I cleaned up the wp-config.php file and reinstalled wordpress and now the blog is scanning green! Thank you ??

    I have submitted it to Google for review. Hopefully it will be taken out of blacklist soon.

    @hollybret get a clean version of ALL plugins, especially any that contain java or timthumb.php The infected java files will usually be in a folder inside the plugin folder called js, jquery or Ajax. I found that I was attacked through a plugin – iSlidex

    Does anyone have more info about the nature of the attack, what was the purpose and what info were they targeting/collecting?

Viewing 10 replies - 46 through 55 (of 55 total)
  • The topic ‘Malware (counter-wordpress.com) Warning on Chrome’ is closed to new replies.