• Resolved ramigrafx

    (@ramigrafx)


    I have not put anything on my site for over 6 months. A few days ago a friend told me that there was a warning when trying to access my site on Google chrome. What is wrong and how do I rectify it?
    Thanks,
    Ramigrafx

    http://www.ramigrafx.com

Viewing 15 replies - 1 through 15 (of 19 total)
  • Moderator James Huff

    (@macmanx)

    Volunteer Moderator

    Here are the details from Google: http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=http%3A%2F%2Fwww.ramigrafx.com%2F&client=googlechrome&hl=en-US

    There’s definitely a lot of malware reported. Does the site look ok if you visit it and ignore the error (use an Incognito mode in Chrome)?

    Hi, ramigrafx, & welcome. It would appear that your site may have been compromised. I’m really sorry.

    A resource you can go to is:
    http://codex.wordpress.org/FAQ_My_site_was_hacked

    I’ll give some personal guidance as well.

    When dealing w/a site compromise, the objectives are twofold:
    1) Fix the site; &
    2) Fix backdoors that the hacker used to gain entrance into your site, so this hopefully will not happen again.

    Most people place great emphasis on objective #1, but, in truth, the 2nd one is actually the most important, as, without it, your site will continue to be reinfected.

    Here are the steps to take.

    First, notify your host, as this might be a serverside hack as opposed to simply a site compromise. Also, if you’re on shared hosting, the hack has the potential to compromise the entire server. Additionally, you may wish to take the site offline, & your host can help you do this. They might not help you–then again, they might. You won’t know unless you notify them. If they say it’s not their responsibility, (& it really may not be), then please continue reading.

    Second, scan any devices you will use to log onto your website for malware. It does no good to change credentials, etc., which you will need to do, if malware phones them home to their command & control center. It’s actually better to do more than 1 scan, each using a different program, as no single malware scanner can detect everything.

    Third, secure your network. Definitively use secure FTP as opposed to regular FTP. The port used for secure FTP varies from host to host. Many use port 22, some 2222, while others use different ports altogether. Check their knowledge base or call their support. You can ask this question when you notify them of the compromise in the first step.

    Never log onto your site using a public hotspot, such as those in hotels, cafes, etc. Make sure you’ve changed the default password, Ssid, (&, if applicable) the username on your router/modem. If you don’t use wireless, turn it off in your router’s options.

    All these steps are required to ensure that no one can snoop your credentials, etc.

    Now that the device you’ll use to fix your site, as well as your network, is secure, it’s time to direct your attention to actually fixing your site.

    Next, please log into your website control panel from a secure connection and change all passwords, including those to any databases you may have set up. This includes your control panel/FTP credentials & your WordPress database.

    Next, take a backup of your website’s files. Be certain to label it such that the label contains both the date you backed it up on, as well as the word “hacked”–we certainly don’t want you accidentally restoring this backup! This can be helpful, though, in terms of perhaps being able to determine how this occurred, though my feeling is that it likely did so because of an outdated site. Probably you should just back up your web root. Depending on your host, it might be called public_html, htdocs, www, or /.

    Please also back up your database as well. The article at
    http://codex.wordpress.org/Backing_Up_Your_Database
    shows you how to do that, in case you need it.

    The section regarding phpMyadmin is likely the most relevant to your case. It’s going to be necessary to search that database file to see if any evidence of the hack exists there. That can be done by opening the file in a text editor. To start off with, consider searching for the words:

    [ Moderator note: code fixed. Please wrap code in the backtick character or use the code button. ]

    <script>;
    <? php;
    base64;

    Also be advised that sometimes supposed image filess can contain code, so open all your image files, particularly in your uploads folders, to ensure they really are images & don’t contain code. Better yet, if you have the images on your machine, replace files in the uploads folders with them.

    If you find nothing, either in your database or in your /uploads folders, then the next step is to delete, then complete reinstall WordPress, as well as any plugins or themes you were using.

    Please also post your .htaccess file here for examination so we can make certain no backdoor code exists there.

    In summary, here are the steps:
    1) Back up your WordPress files, including core, themes, & plugins;
    2) Back up your database using PhpMyadmin;
    3) Look through the database to insure there is no evidence of the hack;
    4) Search the uploads folders for image files that contain code;
    5) Post your .htaccess file here so we can look at it as well.
    6) Please do not attempt to post the entire database here, but if you find content w/the words I suggested above, then post that so we can look at it as well.

    Please keep in touch, & let us know how this goes.

    Moderator James Huff

    (@macmanx)

    Volunteer Moderator

    And, if you’re able to recover it, you may want to implement some (if not all) of the recommended security measures.

    @ramigrafx

    So nice to meet you 🙂

    I don’t know what to say about you or your website but,
    my client’s websites are infected and when I checked with google webmaster tools, it is showing strange warning. The malware is redirecting visitors to you/your site:

    <script type="text/javascript" src="http://ramigrafx.com/wp-content/themes/wp-creativix/XXXXXX.php?id=3985119">

    Do you have solutions????
    ~
    Rakesh

    Hi, Rakesh, & welcome.

    Truthfully, you should be starting your own topic, however, since you didn’t, I’m going to suggest that you please read the tips I gave ramigrafx regarding fixing his site, as they’re applicable to your clients’ sites as well.

    Should you have any questions, though, please do consider starting your own topic regarding this.

    Moderator Jan Dembowski

    (@jdembowski)

    Forum Moderator and Brute Squad

    Should you have any questions, though, please do consider starting your own topic regarding this.

    Which you can do with this link.

    https://wordpress.org/support/forum/how-to-and-troubleshooting#postform

    Thanks so much, Jan. I hesitated to say that, since I’m not a moderator, but…

    Hi abletec & Jan,

    Thanks for your welcome note.
    I intentionally posted here because my sites are hacked and pointing to the OP’s site. This may of may not be intention of the OP [ramigrafx] but as a simple rule of thumb, I am personally considering ramigrafx.com as spammer.
    Google reported it as suspicious snippet put on my sites
    [ redacted ]

    Rakesh, his site is hacked, too, & this is where the bad actors are redirecting. He should take care of it, since he knows the site has been compromised, but he has nothing to do w/the original hack, most likely.

    If your clients’ sites are all on the same server, this might indicate a server compromise.

    Moderator Jan Dembowski

    (@jdembowski)

    Forum Moderator and Brute Squad

    @ekwave Unless you are here to help the original person who posted this topic then please, per the forum welcome start your own topic with your own details.

    https://wordpress.org/support/forum/how-to-and-troubleshooting#postform

    It really is the best way to get help for your problem.

    The reply will be the same though but yes, please start your own topic. It’s really considered rude when you try and take over someone elses.

    (Also this will be my reply:

    You need to start working your way through these resources:
    http://codex.wordpress.org/FAQ_My_site_was_hacked
    http://wordpress.org/support/topic/268083#post-1065779
    http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/
    http://ottopress.com/2009/hacked-wordpress-backdoors/

    Additional Resources:
    Hardening WordPress
    http://sitecheck.sucuri.net/scanner/
    http://www.unmaskparasites.com/
    http://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html
    http://blog.sucuri.net/2010/07/understanding-and-cleaning-the-pharma-hack-on-wordpress.html

    But still, start your own topic.)

    Thread Starter ramigrafx

    (@ramigrafx)

    ekwave. Read the original posting. I am not a spammer. I am a victim too!
    I have sorted out my site, so you do the same for yours

    ramigrafx, I’m glad you got your site sorted. Could you please mark this topic as ‘resolved’ so we know that indeed it is, & so perhaps this won’t occur again?

    Thanks so much!

    ramigrafx,

    Sorry for the misunderstanding because that strange malware linked my sites to yours.
    Thanks for clarifying the issue. Please post here the remedy as it will help many of us to troubleshoot this malware.

    @jan,
    I will create a new post if ramigrafx’s solution is not going to work.

    Thread Starter ramigrafx

    (@ramigrafx)

    Hi.
    Installed the plugin Wordfence Security, and when I ran it, it identified all the links on my site that were dubious. To be on the safe side I deleted them and remade them. I then check that I had sorted the problem. Now when I run Wordfence everthing is clear. All of the dubious links were internal ones on my site so I don’t really think that there was anything wrong on my side as the files had not been altered since the last time that I put data on my site which was 4 months ago. I was only aware of a problem Thursday last week when Google blocked my site. The original problem must be elsewhere.

    Result….Congratulations! No security problems were detected by Wordfence.

    ramigrafx,

    Great tip. I am assuming you enabled all features through wordfence to scan all files from outside WordPress also.

    Thanks.

Viewing 15 replies - 1 through 15 (of 19 total)
  • The topic ‘The site ahead contains malware’ is closed to new replies.