• Specs:
    website:www.gezelligenleuk.nl
    wordpress: 3.9.2
    theme: Studiopress Genesis with News-Pro childtheme

    Hello,

    My website has been hacked. My website is about art, but someone added 6 pages to my site linking to casino- and gambling websites.
    Webmasters Tools shows that 55.000 (!!!) casino-websites are linking to my site. Needless to say that this is disastrous for my ranking in Google.

    I tried everything to get rid of the links. The strange thing is, there are 6 pages added but I can NOT see them in my WordPress-admin, as if they don’t
    exist. They all look like this: /?p=online-casino-uk

    This is what I’ve tried so far:

    – Re-installed WordPress, I even bought a total new fresh copy of the Studiopress News-Pro childtheme.
    – Changed all passwords
    – Deleted and re-installed all plugins
    – Wrote a robot-txt file to tell Google not to index the 6 casino-pages
    – Sent a request to Google to ignore the 55.000 links
    – Found and removed at least 1 malicious file in php-admin (could not find more)
    – Installed and tried many security plugins like WordFence (they could not find anything)

    Some of these actions were successfull, but everytime the casino links keep coming back. What I find very strange is that I completely removed my old
    version of the New-Pro theme and installed a fresh copy which I just purchased. How can the links come back?
    It’s as if this virus operates from outside.

    Is there somebody here who knows the answer to this problem? Anyone having the same experiences?

    These are the links:
    /?p=online-gambling
    /?p=casino-bonus
    /?p=online-casino-uk
    /?p=online-casinos
    /?p=online-casino-usa
    /?p=mobile-casino

    Paul

Viewing 6 replies - 1 through 6 (of 6 total)
  • Moderator Jan Dembowski

    (@jdembowski)

    Forum Moderator and Brute Squad

    Moderator bcworkz

    (@bcworkz)

    Hi Paul, I’m sorry for your troubles.

    Like Jan said, you need to work through his linked resources.

    How can the links come back?
    It’s as if this virus operates from outside.

    That is actually exactly what is happening, though it’s surely not a true virus causing this. A hacker gained file level access either through a weak password or vulnerable code. Possibly a theme or plugin, quite unlikely to be WP core itself. The hackers were able to install a backdoor, enabling them to remotely control your site.

    Go ahead and skip down to the above linked ottopress.com article on backdoors, it nicely explains what you’re up against.

    Good luck!

    Thread Starter gezelligenleuk

    (@gezelligenleuk)

    Thanx! Much appreciated. I’ve tried a lot so far and I’m still busy with it.

    Also found this site: This company claims to have the solution for the casino links, exactly as how the links loof like on my hacked site but… They want to get paid for it. Is this real or fake?

    https://www.googlebig.com/2014/04/04/how-to-remove-verified-casino-spam-page-on-wordpress/

    And then there’s this guy here with a solution: I tried it but it doesnt work. I will try to contact him directly but is there somebody here who can confirm that this might work? See his post below:

    Have the same issue and managed to put together a short script that removes those entries. Place a PHP file in your WP root with the following contents and run it in your browser:

    [ Moderator note: Code fixed, please wrap code in backticks or use the code button. ]

    <?php
    /** Loads the WordPress Environment */
    require( dirname( __FILE__ ) . '/wp/wp-blog-header.php' );
    global $wpdb;
    
    $blogs_details = $wpdb->get_results('SELECT <code>blog_id</code>, <code>domain</code> FROM <code>wp_blogs</code> ORDER BY <code>wp_blogs</code>.<code>blog_id</code> ASC', ARRAY_A);
    foreach ($blogs_details as $blogDetails)
    {
        echo "Checking ". $blogDetails['domain'] ." (#". $blogDetails['blog_id'] ."):";
    
        $casinoFixFind = "SELECT * FROM <code>wp_&quot;. $blogDetails['blog_id'] .&quot;_options</code> WHERE <code>option_name</code> = 'client_data_run'";
        if ($wpdb->query($casinoFixFind)) {
                echo "Darn! Found entry here... ";
                $casinoFixRemove = "DELETE FROM <code>wp_&quot;. $blogDetails['blog_id'] .&quot;_options</code> WHERE <code>option_name</code> = 'client_data_run'";
                if ($wpdb->query($casinoFixRemove)) {
                    echo "<strong style='color: green;'>Successfully fixed!";
                } else {
                    echo "<strong style='color: red;'>SHIT!ERROR: ". mysql_error() ."";
                }
        } else {
            echo "<strong style='color: green;'>". $blogDetails['domain'] ." is clean!";
        }
    } ?>
    Moderator bcworkz

    (@bcworkz)

    That script, besides being outdated, simply removes option table data named ‘client_data_run’. You could manually do that yourself from phpMyAdmin or the equivalent in your host control panel. Hacks these days invariably install backdoors hidden somewhere in code pages. Without removing that (those?), any other cleanup attempts will be fruitless because the content can be restored in a matter of seconds through the backdoor. A specifically targeted script can work, but the specifics of hacks morph quite quickly, so such scripts become useless in short order.

    I’ve no idea about these googlebig guys, it may be legit, or not. Your guess is as good as mine. Any attempt to clean a hack without destroying data is a hit or miss affair. The only sure way to clean a site is wipe it blank and restore form a known clean backup.

    If I were to hire someone to clean my site, I’d be more inclined to go with someone who have established some ‘net credibility, even if it costs more. Say someone who has offered free malware scanning services for quite some time. I can’t make a specific recommendation because I haven’t used any such cleanup services.

    Have you changed the passwords of your website management login ?
    Have you changed the passwords on ALL FTP logins to your site ?
    Have you tried to identify and reject calls on the casino pages in your .htaccess ?

    Are you able to see when and how your website is being accessed in the access logs ?
    Can you look for .php files being accessed which are not from /wp-admin, /wp-includes or /wp-content and of course the root itself.

    Much of the mischief you are seeing which persists after reloading files, is because the content is in your database.
    When you reload files, it is also necessary that you DELETE all the files that were already there.

    This is how I found it: https://www.langiulli.com/2014/04/rimuovere-il-malware-spam-del-verified-casino-su-wordpress/#comment-7798

    Malicious code hiding in my parent theme functions.php and 4 pseudo png files in the same folder.

Viewing 6 replies - 1 through 6 (of 6 total)
  • The topic ‘Serious site hack attack’ is closed to new replies.