• I have a fully patched Windows 2008R2 Server running IIS 7.5. Recently, the server was compromised and I found “cron.php” files located in a number of WordPress root directories on the server. When called over http these cron files would create thousands of .html files within sub folders that link to a Chinese site.

    I enabled IIS logging and have blocked the offending IP addresses via Windows firewall and via IIS 7.5 IP restrictions.

    I have cleaned the WordPress directories and reinstalled WordPress within all effected sites.

    I have also revoked write access to the root WordPress folders.

    However, I am still seeing post requests attempting to reach the cron.php file within each WordPress site (which no longer exists). Here is an example log entry…

    2015-09-15 20:54:51 xxxxxxxx POST /cron.php – 80 – 142.0.132.25 Mozilla/5.0+(Windows+NT+5.1)+AppleWebKit/537+(KHTML,+like+Gecko) 403 6 5 374 2015-09-15 20:54:52 xxxxxxxxx POST /cron.php – 80 – 142.0.132.25 Mozilla/5.0+(Windows+NT+5.1)+AppleWebKit/537+(KHTML,+like+Gecko) 403 6 5 136

    The 403 tells me that the request was denied.

    My question is, is there any further action I can take to stop these requests being attempted? Any advice would be most helpful.

    Please let me know if I can provide any further information.

    Thanks,

    Paul.

Viewing 1 replies (of 1 total)
Viewing 1 replies (of 1 total)

The topic ‘Compromised server running WordPress advice’ is closed to new replies.