• Resolved blueprint4

    (@blueprint4)


    I am leaving wf because I am tired of all my users site still being hacked. I personally run scan everyday on their sites and update their plugins. Yet each week a different site is hacked and I am tired of it. The final straw was today and I went to fix another hacked site and never got any alerts. I checked the cpanel email log and seen how 100’s of emails was sent to [email protected]. After hours of trying to figure out what script was sending all these emails I find out it was wf. It was when I searched my database and it was under Table: wp_wfconfig. For wf to be altered is very scary for me.

Viewing 1 replies (of 1 total)
  • Plugin Support WFAdam

    (@wfadam)

    Hello @blueprint4 and thanks for reaching out!

    I am sorry to hear that you are experiencing this. I will explain in more detail some possible scenarios of how a hacker can gain entry and why a site becomes compromised – even if you are very meticulous at keeping your server software, WordPress, your active and inactive plugins and themes all up to date with the latest versions.

    Some causes of a hack are impossible for any WordPress security plugin to protect against:
    1) If you are using a weak password for your hosting account control panel or FTP account then a hacker may gain entry this way, with full access to your site’s file system and database.
    2) You are storing unmaintained, unarchived backups of your site that are publicly accessible that contain exploitable vulnerabilities.
    3) You are hosting more than one PHP application, such as more than one installation of WordPress, in the same hosting account and infection can spread from another application to this site.
    4) You have unmaintained or vulnerable 3rd party scripts installed in your hosting account. Examples would be the Adminer or SearchReplaceDB database management tools.
    5) A nulled theme or plugin with malware already pre-installed. If you paid for a theme or a plugin outside of the vendor’s website at a massively reduced price, that seemed too good to be true, then it is likely to be nulled.
    6) If you are using a shared hosting account a neighboring account can be infected and spread the infection to this site.
    7) Your WordPress wp-config.php configuration file could be readable to the hacker, either directly via your hosting account, via a vulnerable plugin, or via another hacked site on the same server.
    8) The hosting accounts on the server may not be properly isolated so the hacker has access to your database via another user’s database.
    9) The server software has vulnerabilities that allow the hacker to get root access – such as running an end-of-life version of PHP on the hosting server that has unpatched vulnerabilities.
    10) If the hack took place at a time when you only had the free version of Wordfence installed then you wouldn’t have had access to the latest firewall rules that premium customers have access to.
    11) You may be using a plugin or theme with a vulnerability that is so severe that Wordfence can not protect against it and we may be unable to create a custom firewall rule for the vulnerability. However, being unable to create a custom firewall rule is very rare.

    Wordfence protects against a vast variety of attacks. Whether you were hacked because of an unknown attack method or because there is some other issue in your system impossible to say at this stage without an extensive investigation. There are some aspects of your site security that are completely beyond our control such as vulnerabilities on your hosting server as described above. Although rare, for examples of hosting provider vulnerabilities please see these two articles below:
    https://www.wordfence.com/blog/2019/06/service-vulnerability-four-popular-hosting-companies-fix-nfs-permissions-and-information-disclosure-problems/
    https://www.wordfence.com/blog/2018/02/service-vulnerability-nfs-permissions-problem/

    You have two choices:
    1) You can clean the site yourself by following the steps in this guide:
    https://www.wordfence.com/docs/how-to-clean-a-hacked-wordpress-site-using-wordfence/
    https://www.wordfence.com/help/scan/scan-results/

    Useful links after you have completed your cleaning:
    https://www.wordfence.com/blog/2017/04/20-minutes-to-secure-wordpress/
    https://www.wordfence.com/blog/2018/10/php5-dangerous/ (important note – this is an old blog post from October 2018 but still very relevant)
    https://www.wordfence.com/blog/2018/10/three-wordpress-security-mistakes-you-didnt-realize-you-made/
    https://www.wordfence.com/blog/2017/06/wordpress-backups/

    We also have an extensive Learning Centre here:
    https://www.wordfence.com/learn/

    2) You can hire a professional service to clean the site for you. Wordfence offers such a service, as do others.

    I hope this helps you!

    Thanks!

Viewing 1 replies (of 1 total)
  • The topic ‘Removing Wordfence’ is closed to new replies.