Title: Developer &amp; Malware
Last modified: April 17, 2019

---

# Developer & Malware

 *  [ReelKeeper](https://wordpress.org/support/users/reelkeeper/)
 * (@reelkeeper)
 * [7 years ago](https://wordpress.org/support/topic/developer-malware/)
 * We hired a developer to create a WP site and obviously the wrong one, I’ll get
   back to that later. More importantly, when our site was launched last month -
   we immediately noticed that there were ‘antabuse’ drug links found on a Ryte.
   com report when we ran a report from the Yoast plugin that the developer installed.
   We provided the report asap and the developer discounted the problem and told
   us that the report results were false/ambiguous and we need to disregard the 
   findings & trust them as the experts. Today, the problem has now escalated and
   we received warnings from GoDaddy that there are ‘viagra’ links associated to
   our new site. We are hosting with GoDaddy and have had another WP site for almost
   7 years with no issues like these. We contacted GoDaddy and put in a ticket to‘
   clean’ this malware from our site.
 * Anyone have any input and/or what else we must do?
    Thanks in advance for your
   advice/help.
 * The page I need help with: _[[log in](https://login.wordpress.org/?redirect_to=https%3A%2F%2Fwordpress.org%2Fsupport%2Ftopic%2Fdeveloper-malware%2F%3Foutput_format%3Dmd&locale=en_US)
   to see the link]_

Viewing 3 replies - 1 through 3 (of 3 total)

 *  Moderator [bcworkz](https://wordpress.org/support/users/bcworkz/)
 * (@bcworkz)
 * [7 years ago](https://wordpress.org/support/topic/developer-malware/#post-11440777)
 * Apparently your site was hacked. Assuming it gets cleaned up properly, afterwards
   go into both WP and your hosting account and change all passwords. Even if you’ve
   done this before, do it again. Change the salts in wp-config.php to force anyone
   currently logged in to need to log in again. Which they cannot do if they don’t
   have the new passwords. You must use good strong passwords. Be sure WP, your 
   theme, and all plugins are all updated to the latest version. You don’t really
   need to do anything else, but you can implement some of the measures in [Hardening WordPress](https://codex.wordpress.org/Hardening_WordPress)
   if you like.
 * To be fair, getting hacked may not necessarily be the fault of your developer,
   though it could be. Clearly ignoring the report results was bad advice.
 * This topic does not belong in Developing WordPress. I’m moving it to Fixing WordPress.
   We know that determining the right forum is not always clear, so no worries there.
 *  Thread Starter [ReelKeeper](https://wordpress.org/support/users/reelkeeper/)
 * (@reelkeeper)
 * [7 years ago](https://wordpress.org/support/topic/developer-malware/#post-11440978)
 * Thank you for responding [@bcworkz](https://wordpress.org/support/users/bcworkz/)
   and helping with placing us in the correct forum.
 * I agree that the site got hacked (it happens) but while it was being built/developed?
   Then, for us to inform the developer right away (a few days after delivery/launch)
   and provide the reports that a layman person received by clicking on a simple
   link in the dashboard on the (Yoast/Ryte) plugin that the developer installed.
   I’m sure you can understand why we’re so frustrated.
 * The hack obviously got worse as the hosting company alerted us today and when
   I contacted the developer, the developer sent back an email that it’s ONLY a ‘
   sales pitch’ by the hosting company. If this was a private developer I got off
   some 3rd party website or freelancer site, I guess it would be more on me but
   this is a business/developer with a presence on the internet as a WP Developer
   with a large portfolio.
 * We updated the plugins & changed the PW’s (strong) but would you be kind and 
   step me through:
 * > “Change the salts in wp-config.php to force anyone currently logged in to need
   > to log in again.”
 * Thank you very much, in advance.
 *  Moderator [bcworkz](https://wordpress.org/support/users/bcworkz/)
 * (@bcworkz)
 * [7 years ago](https://wordpress.org/support/topic/developer-malware/#post-11444835)
 * Oh sure, it’s very frustrating, I get that. If a site is publicly accessible,
   it can be hacked. While it is being developed, a site can be more susceptible
   to hacks because not all security measure may be in place yet.
 * It is a common scam for nefarious “security consultants” to falsely claim a security
   breach and offer to resolve it for a “modest fee”. While GoDaddy might try to
   push upgrades you don’t really need, I think it’s very unlikely they would flat
   out claim to have found pharmaceutical malware if it did not actually exist.
 * Changing salts might be a bit belts and braces, but better safe than sorry. Especially
   after the effort to change passwords and get the site cleaned. Download the wp-
   config.php file from the server using FTP or your hosting account’s file manager.
   Make a backup copy. Open the downloaded file with a plain text or coding editor(
   not a word processor!). There will be a comment reading “* Authentication Unique
   Keys and Salts”. A bit below this is a series of `define();` function calls, 
   usually with a bunch of random characters. Replace this block of 8 define() calls
   with the one randomly generated at [https://api.wordpress.org/secret-key/1.1/salt/](https://api.wordpress.org/secret-key/1.1/salt/).
 * Save the modified file, then upload back to the server. Now anyone that had remained
   logged in since the last couple weeks or so will be automatically logged out.
   The login cookie credentials must in part match some of these salts. Change the
   salts and the old login cookie instantly becomes invalid.

Viewing 3 replies - 1 through 3 (of 3 total)

The topic ‘Developer & Malware’ is closed to new replies.

 * In: [Fixing WordPress](https://wordpress.org/support/forum/how-to-and-troubleshooting/)
 * 3 replies
 * 2 participants
 * Last reply from: [bcworkz](https://wordpress.org/support/users/bcworkz/)
 * Last activity: [7 years ago](https://wordpress.org/support/topic/developer-malware/#post-11444835)
 * Status: not resolved

## Topics

### Topics with no replies

### Non-support topics

### Resolved topics

### Unresolved topics

### All topics
