• I’ve copied the injected injected code below. It appears in all the pages on my site, right below the <body …> tag. Interestingly it can only be seen by “inspecting element” in the browser; page source does not reveal it (I’ve added some line breaks to make it more readable, but this is exactly what shows up in my page.

    Link The Code

    As I can fix this?

Viewing 3 replies - 1 through 3 (of 3 total)
  • Hi,

    Please check this https://codex.wordpress.org/FAQ_My_site_was_hacked

    You can google for it too, will find tons of resources.

    Good luck 😉

    I’ve been fighting this one for the past week. I found this thread and this one.

    Using MalwareBytes, Windows Defender and Kaspersky, I scanned/cleaned my computer of all suspected trojans (MalwareBytes found several), I reinstalled WP, themes, plugins, changed passwords, manually scrubbed header.php in every site, but the thing kept returning. I finally installed WordFence on the advice of timcolman in the second thread above. I scanned all my sites. All were clean except one, which found these problems:

    Critical Problems:
    * WordPress core file modified: wp-includes/feed-atom-comments.php
    * File appears to be malicious: _love.php
    * File appears to be malicious: wp-admin/css/colors/ectoplasm/template.php
    * File appears to be malicious: wp-content/db12.php
    * This file may contain malicious executable code: wp-content/plugins/jetpack/modules/custom-post-types/portfolios.php
    * File appears to be malicious: wp-content/uploads/2014/11/xml87.php
    * File appears to be malicious: wp-includes/Text/Diff/Engine/user67.php
    * File appears to be malicious: wp-includes/js/mediaelement/files36.php
    Warnings:
    * Modified plugin file: wp-content/plugins/contact-form-7-to-database-extension/CFDBShortCodeSavePostData.php
    * Modified plugin file: wp-content/plugins/jetpack/modules/custom-post-types/portfolios.php

    Where files were modified, I reverted to the original. Many of these had been stripped of the developer’s code and replace with hack garbage. Files that appeared to be malicious, I deleted. Be sure to check your uploads folders for PHP files and files you didn’t personally upload.

    I’ve been monitoring my sites for a couple days now and they are staying clean. I suspect the one site was infecting all the others, as they were all housed within the same hosting account.

    jt

    Also keep in mind, that all files you can always rewrite – upload again – core wordpress, plugins, theme too, just keep your upload folder untouched – your media …

    Important is to check if nothing crapy stay in database, as there you store your data.

    Also if you have simply site, maybe just blog post or whatever, consider just somehow create new fresh installation and import posts there from this hacked version 😉

Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘JS Injection ("kfc.i.illuminationes.com/snitch")’ is closed to new replies.