• Hey guys,

    I am complete noob when it comes to word press but Google Webmaster Tools has flagged this:

    [Code moderated. Please do not post hack code blocks in the forums. Please use the pastebin]
    Anybody got any ideas of what I could do to remove?

    Cheers

Viewing 7 replies - 1 through 7 (of 7 total)
  • Can you post your URL so we can look at.

    The short answer is: download your core files to your PC, then do a search for that string (or part of it) to locate the infected file(s). Remove the offending code, then replace the affected file(s) in your server.

    The long answer is that you need to do a full inspection and cleanup of your wordpress core files and database. I’m trying to sort this out myself. Lots of links and suggestions out there, but I’ll warn you even for this very technically minded person, it gets confusing and unclear real fast. And all the people helping here seem to assume it should all be so obvious. I’m sure it is, but it takes tenacity and patience.

    Here are 3 threads with my travails…
    Thread 1
    Thread 2
    Thread 3

    SAME PROBLEM.
    In using the wordpress editor, how can I delete the coding as described above?
    Coding and issue associated with it do not show up on Firefox.
    Any help would be appreciated, as far too many to coun sub menus cannot be accessed.

    It only shows up and effects the sites when loaded in IE.

    In using the wordpress editor, how can I delete the coding as described above?

    Depending on what file the coding resides in, you may not be able to access and/or edit it in the wordpress editor. It’s probably pretty safe to say that a hacker will purposely place the code in files that aren’t accessible through the editor.

    Get a FTP client application, log on to your server, download your entire WP installation folder. Then do a search for the offending code or signs of it. In some cases you will be able to do do a grep or grep-like search through your entire folder structure for “known” malicious code and flag the files that contain them. In other cases you will painfully need to manually inspect your directories and files.

    The brute force method of replacing all files from a clean WP install is good for the bulk of the core files, but in some cases (wp-config.php, wp-contents/themes, actual content you’ve added etc.) you will need to sift through to figure out what belongs and what doesn’t. The hardest thing for me was plugins I’ve added (under the wp-content directory) because being unfamiliar with how file names and contents are supposed to look, it is difficult to determine what to flag as ‘malicious.’

    Good luck, Google a lot, and be patient. I’m almost thru with my cleanup, and I still wonder whether I’ve caught everything.

    One bit of warning on that last link (scanner): when I used it on my site, it came back clean, yet subsequent manual inspection uncovered several infections. Does anyone know of alternative scanners?

Viewing 7 replies - 1 through 7 (of 7 total)
  • The topic ‘Site Hacked Help’ is closed to new replies.