Forum Replies Created

Viewing 2 replies - 1 through 2 (of 2 total)
  • Thread Starter DKQ

    (@deepakkumarq)

    Thanks, @vmarko. The last thing I wanted to know is whether these cache files can be targeted/exploited in any way by an attacker because I see multiple post requests to these files and a few of them returned HTTP 200 on my server. And this is the same time my website starts showing error and in my server logs I can see this kind of error:

    <trimmed> FastCGI sent in stderr "PHP message: PHP Fatal error: Uncaught Error: Function name must be a string <trimmed>

    My website goes offline until I restart my PHP fpm service and every request to my website generates the above error.

    And, I will work on your feedback on using memory-based caching.

    Thanks!

    • This reply was modified 2 years, 2 months ago by DKQ.
    • This reply was modified 2 years, 2 months ago by DKQ.
    Thread Starter DKQ

    (@deepakkumarq)

    Hi @vmarko

    These are the server logs. We are using a endpoint security software (can’t disclose the name) which monitors our server for any malicious file and it found a coinminer in this path:

    wp-content/cache/db/singletables

    The request that you see was found in my server logs.

    Thanks

    • This reply was modified 2 years, 2 months ago by DKQ.
Viewing 2 replies - 1 through 2 (of 2 total)