Support » Plugins and Hacks » [Resolved] Phishing alert

[Resolved] Phishing alert

  • echoleaf


    I received a phishing alert for my site and it was traced to the iWP-Client folder. The hackscan noted


    in /wp-content/plugins/iwp-client/core.class.php

    I’ve replaced the hacked files with new copies of the plugin files. Have you experienced anything like this before?


Viewing 15 replies - 1 through 15 (of 18 total)
  • esmi


    Forum Moderator



    Damn – I just ran a virus scan on my cpanel and this is what I got:

    public_html/wp-content/plugins/iwp-client.zip	{HEX}a2.brazilbank.phish.1.UNOFFICIAL
    public_html/wp-content/plugins/iwp-client/core.class.php	{HEX}a2.brazilbank.phish.1.UNOFFICIAL
    public_html/domain.com/wp-content/plugins/iwp-client.zip	{HEX}a2.brazilbank.phish.1.UNOFFICIAL
    public_html/domain.com/wp-content/plugins/iwp-client/core.class.php	{HEX}a2.brazilbank.phish.1.UNOFFICIAL

    The .zip is what I just downloaded from WordPress.org! I’m deleting the plugin until we get to the bottom of this.



    Thanks for those links, I will go through them immediately.

    where did you download the iwp-client.zip?


    Plugin Author infinitewp


    As esmi pointed out if your site is fully compromised the virus will recreate itself on different folders. So kindly do a full clean and let us know.

    The code in the repository is definitely virus free. We do our side of investigation and WordPress.org also constantly scan all popular plugins for virus / malicious activity.

    Let me know if you have any doubt.

    Hello infinitewp

    Anything we should be worried about?
    I also ran a Virus Scanner powered by ClamAV on Cpanel and all my wp sites with infitewp got flagged with this a2.brazilbank.phish

    public_html/XXXXX1.fr/wp-content/plugins/iwp-client/core.class.php	{HEX}a2.brazilbank.phish.1.UNOFFICIAL
    public_html/XXXXX2.com/wp-content/plugins/iwp-client/core.class.php	{HEX}a2.brazilbank.phish.1.UNOFFICIAL
    public_html/XXXXX3.com/wp-content/plugins/iwp-client/core.class.php	{HEX}a2.brazilbank.phish.1.UNOFFICIAL
    public_html/XXXXX4.com/data/plugins/iwp-client/core.class.php		{HEX}a2.brazilbank.phish.1.UNOFFICIAL

    I did remove the plugin and re-ran a virus scan and did not find any issues. I than Re-installed infinitwp re-scan and got the a2.brazilbank.phish again.

    Hello guys, I have WP 3.8.1 with cPanel and ClamAV and I tried to reproduce the issue scanning several sites but I’m not getting this phishing issue.

    Are you both using shared hosting?
    Maybe the entire server is compromised, or maybe you both are using casually the same vulnerable plugin/theme which lead to an intrusion.
    Are you using the last versions of WP and InfiniteWP?

    I’m on a different host now, I assume the old host had been compromised.

    Hello Marcelo, I have multiple WP sites on several servers, dedicated and shared, including wpengine, and only got this issue with this one (shared) hosting company.
    I am trying to follow up with Tech support to figure out why ClamAV is giving us this false positive and I also got a similar issue with a managewp plugin on that same server.
    So I am not worried and will keep managing my 40+ sites with infinitewp 🙂

    I am using InfiniteWP on my new host, sorry for not mentioning it before. This is definitely not an issue specific to InfiniteWP.

    Maybe the shared hosting is compromised, or the ClamAV is outdated, thus detecting a false positive….

    Just following up my last message, Tech support did not provide an acceptable answer:

    “This false positive can happen from time to time if the system believes the code inside has been hacked (especially with anything involving EVAL code).
    As long as nothing if being effected on your site, then you should be good to go.”

    @divergreg: I know it looks like a cheap answer. BUT, all in all, majority of online security software will simply alert you when they detect an eval with a base64_decode command, because -except for very specific cases- they can’t decode and follow links or commands to see if it is dangerous. That’s why those are ending in the mere alert. WordFence firewall and scan plugin also has this behaviour. It’s up to you to further investigate and detect weird files and/or behaviours.

    You should decompress in your PC the plugin zip pack downloaded from WP repo and FTP it to your “compromised” site. See if right after upload the files size has been increased compared to your offline versions (this due to code injection by a malware). If not, wait a couple minutes and compare again. If not, wait a couple hours and compare again. If not, and if after 24 hours the files remain untouched, you could then have peace of mind…

    Hello Marcelo, thank you for clarifying a little all this.
    I just tried uploading that one file and now that server is changing the file permission to 000 and will not let me upload or change this file or the entire zip file directly from wordpress.org

    But the question I had was why did a Cpanel with ClamAV on different servers did not return the same thing… short of being different versions.

Viewing 15 replies - 1 through 15 (of 18 total)
  • The topic ‘[Resolved] Phishing alert’ is closed to new replies.