Site hacked 3 times with Wordfence (free) enabled
-
Hi guys,
I am having an issue with one of my sites. It has been hacked 3 times since 31 December 2016 while Wordfence free was active with maximum protection enabled. The first time it was hacked, WordPress and some plugins were not up to date. The subsequent two times, everything was up to date. It seems to have been hacked twice by one hacker and once by a different hacker, the former leaving a signature in the site title, and a few other places, that starts with: +ADw-/title+AD4-HaCKeD By+AF8-uMuT SunaR..+ACEAIQ
The hacker had access to the database and reset all existing user’s passwords, then used an account with administrator privileges to log in to the WordPress dashboard. I was alerted to the hack by Wordfence’s admin login notification and I believe that the site had been compromised before the hacker logged in, because the hacker signature was in the website title that is included in the admin login notification.
I know this is free support and I’m using the free product, so don’t expect a speedy response, if at all, but I thought you guys may also benefit by taking a look to see if you can see how this hacker is getting past your firewall? All non-identifiable details I can think of are included below:
The only installed and active theme was Enfold by Kriesi 3.8.4 (latest version). All other themes have been deleted.
All plugins were updated to their latest version:
– 301 Redirects By Tony Spiro
– Duplicator by LifeInTheGrid
– Gravity Forms by rocketgenius
– Wordfence Security by Wordfence
– Yoast SEO by Team YoastAll other plugins had been deleted. I cannot find any published vulnerabilities for any of these.
The site is hosted on a shared web server. The web server has the following software installed:
– Linux 2.6.32-642.11.1.el6.centos.plus.i686
– cPanel 56.0 (build 41)
– Apache Version 2.4.18
– PHP Version 5.6.23
– MySQL Version 5.6.33
– Perl Version 5.10.1I also restricted file privileges as much as I could without breaking the site, however, it does not seem like any files were modified to gain access. I did also check a list of the most recently modified files on the compromised site and found nothing of interest.
I found two other websites running on the same shared server that were also hacked and had the same hacker signature in the site title. The hosting provider has run their own malware scan on my site, and the other two, and say that the scan comes back clean. I ran the Wordfence malware scan on the site and it came back clean with the exception of a minor difference in the wp-content/plugins/duplicator/readme.txt file which I find strange. I have analysed this file and can’t see anything malicious. Before running the scan I checked all the scan options except:
– Enable HIGH SENSITIVITY scanning. May give false positives.
– Use low resource scanning. Reduces server load by lengthening the scan duration.I have also created a clean installation of WordPress and all the above-mentioned themes and plugins and compared it to the compromised version of the website using a strong hashing algorithm and there are no unexpected differences in any of the files except the same readme.txt file mentioned above.
Let me know if there’s any other information you would need from me. I’ll be happy to assist any way I can.
Regards,
Gareth
- The topic ‘Site hacked 3 times with Wordfence (free) enabled’ is closed to new replies.