• Hi Folks,
    recently my wp site facing a couple of attack like :

    • some nasty encoded script added into almost all wordpress core files and plugins files
    • a user named ‘backup’ was added
    • a nasty encoded script named options.php was added into root directory
    • and many more

    September 19, 2015 7:13 am
    system
    ::1
    File modified: (multiple entries):
    index.php (old size: 418; new size: 13659)
    wp-activate.php (old size: 4951; new size: 18192)
    wp-admin/about.php
    wp-admin/admin-ajax.php
    wp-admin/admin-footer.php
    wp-admin/admin-functions.php
    wp-admin/admin-header.php
    wp-admin/admin-post.php
    wp-admin/admin.php
    wp-admin/async-upload.php
    wp-admin/comment.php
    wp-admin/credits.php
    wp-admin/custom-background.php
    wp-admin/custom-header.php
    wp-admin/customize.php
    wp-admin/edit-comments.php
    wp-admin/edit-form-advanced.php
    wp-admin/edit-form-comment.php
    wp-admin/edit-link-form.php
    wp-admin/edit-tag-form.php
    wp-admin/edit-tags.php
    wp-admin/edit.php
    wp-admin/export.php
    wp-admin/freedoms.php
    wp-admin/import.php
    wp-admin/includes/admin.php
    wp-admin/includes/ajax-actions.php
    wp-admin/includes/bookmark.php
    wp-admin/includes/class-ftp-pure.php
    wp-admin/includes/class-ftp-sockets.php
    wp-admin/includes/class-ftp.php
    wp-admin/includes/class-pclzip.php
    wp-admin/includes/class-wp-comments-list-table.php
    wp-admin/includes/class-wp-filesystem-base.php
    wp-admin/includes/class-wp-filesystem-direct.php
    wp-admin/includes/class-wp-filesystem-ftpext.php
    wp-admin/includes/class-wp-filesystem-ftpsockets.php
    wp-admin/includes/class-wp-filesystem-ssh2.php
    wp-admin/includes/class-wp-importer.php
    wp-admin/includes/class-wp-links-list-table.php
    wp-admin/includes/class-wp-list-table.php
    wp-admin/includes/class-wp-media-list-table.php
    wp-admin/includes/class-wp-ms-sites-list-table.php
    wp-admin/includes/class-wp-ms-themes-list-table.php
    wp-admin/includes/class-wp-ms-users-list-table.php

     
    September 19, 2015 7:13 am
    system
    ::1
    New file added options.php (size: 14115)
     
    September 19, 2015 4:48 am
    system
    112.78.40.28
    Post deleted; identifier: 2714
     
    September 19, 2015 2:25 am
    (backup)
    92.62.129.97
    Media file added; identifier: 2714; name: small.jpg; type:
     
    September 19, 2015 2:25 am
    (backup)
    92.62.129.97
    Plugin installed: small.jpg
     
    September 19, 2015 2:25 am
    backup
    92.62.129.97
    User authentication succeeded: backup
     
    September 19, 2015 12:05 am
    backup
    92.62.129.97
    User authentication succeeded: backup
     
    September 16, 2015 11:40 pm
    system
    ::1
    File modified .htaccess (old size: 235, new size: 244)`

Viewing 5 replies - 1 through 5 (of 5 total)
  • Really sorry to see this has happened to your site. Please start going carefully through the page below to understand what you need to do about it and how. I’m afraid there aren’t any shortcuts, so take it slowly so you can make sure nothing is left behind that will allow further problems. Best of luck!
    http://codex.wordpress.org/FAQ_My_site_was_hacked

    Thread Starter r1weedee

    (@r1weedee)

    I know that there aren’t any shortcuts, but i hope if anyone experiencing the same could share your case?, what causes these attacks or how to solve it?

    Thread Starter r1weedee

    (@r1weedee)

    I know that there aren’t any shortcuts, but i hope if anyone experiencing the same could share your case?, what causes these attacks or how to solve it?

    This sounds very similar to an attack one of my clients is experiencing – user ‘backup’ ip: 92.62.129.97 has been added as well as the options.php and image file small.jpg and there is additional code at the start of every .php file.

    Obviously I’m doing a full rebuild from fresh theme and plugin files and fully vetting the database – and I now have the access logs archiving each day so I can see exactly where it comes in from if it happens again. I’d prefer to fix the vulnerability before it happens again though!

    Did you work out what vulnerability was used for this attack?

    Hello,
    found a user named backup as well, everything is up to date…
    Found a gwzpassthru.php in uploads/dynamic_avia folder, this folder was in 0777 instead of 0755 hope it’s fixed

Viewing 5 replies - 1 through 5 (of 5 total)

The topic ‘compromised by options.php and a user named backup’ is closed to new replies.