Title: Repeated Hacks at SQL Level.
Last modified: August 21, 2016

---

# Repeated Hacks at SQL Level.

 *  [Roadwolf](https://wordpress.org/support/users/roadwolf/)
 * (@roadwolf)
 * [11 years, 10 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/)
 * I have put off posting about this for several months, but this game is getting
   a tad annoying. Basically I have a hacker (or maybe malware) which is gaining
   access to my wordpress site on a seemingly nightly basis.
 * It began in January when, after cleaning out my website and uploading a fresh
   wp install. I found code buried in several php files dating back to that time.
   I also found some images on my site which were modified and re-uploaded.
 * The site remained dormant for several months after the first hacking attempt 
   in January and only recently has the hacker been more active in trying to gain
   control of it from me. I have completely deleted and reinstalled from scratch
   everything wordpress related several times. I have also looked thru the rest 
   of my photos to see if I notice any unusual modified dates. I have also changed
   passwords to very strong randomized passwords on each level. FTP, cPanel, MySQL
   user, and my wordpress username. There is only one registered user on my wordpress
   setup, which is me.
 * I have run a full Microsoft Security Essentials scan here at home and also a 
   virus scanner on my remote server. All of which come up clean. I have also ensured
   there are no other backdoor SQL users or anything, of which I did find one at
   one point – which I didn’t remember ever setting up.
 * After doing all of the above, several times, I have still found myself having
   to go into SQL nightly to change my username back to admin, after it gets changed.
   Sometimes he will just screw with me and leave everything, but just change my
   user id. Sometimes he will change my password hash.
 * I am looking for any other suggestions here.

Viewing 12 replies - 1 through 12 (of 12 total)

 *  [RossMitchell](https://wordpress.org/support/users/rossmitchell/)
 * (@rossmitchell)
 * [11 years, 10 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113649)
 * You probably have a plugin which is vulnerable.
    Suggest that you install “All
   In One WordPress Security Plugin”, it will scan for and likely find the vulnerability.
   The author’s website is: [http://www.tipsandtricks-hq.com/wordpress-security-and-firewall-plugin](http://www.tipsandtricks-hq.com/wordpress-security-and-firewall-plugin)
   I downloaded it from the wordpress plugin site. Please let us know what you find.
 *  Thread Starter [Roadwolf](https://wordpress.org/support/users/roadwolf/)
 * (@roadwolf)
 * [11 years, 10 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113650)
 * Hmm Okay. Well I only use Akismet as a plugin. But I will try that.
 * Also of note, whenever I try to update or install a new theme I get the following
   errors about update.php.
 * Warning: An unexpected error occurred. Something may be wrong with WordPress.
   org or this server’s configuration. If you continue to have problems, please 
   try the support forums. (WordPress could not establish a secure connection to
   WordPress.org. Please contact your server administrator.) in /wp-includes/update.
   php on line 119
 * Warning: An unexpected error occurred. Something may be wrong with WordPress.
   org or this server’s configuration. If you continue to have problems, please 
   try the support forums. (WordPress could not establish a secure connection to
   WordPress.org. Please contact your server administrator.) in /wp-includes/update.
   php on line 287
 * Warning: An unexpected error occurred. Something may be wrong with WordPress.
   org or this server’s configuration. If you continue to have problems, please 
   try the support forums. (WordPress could not establish a secure connection to
   WordPress.org. Please contact your server administrator.) in /wp-includes/update.
   php on line 435
 * I tried re-uploading a fresh copy of update.php a few times and that didn’t seem
   to solve it.
 * –
 * I will try the above mentioned plugin to see what it will find. I think the update.
   php issue may be a hint.
 *  Moderator [Jan Dembowski](https://wordpress.org/support/users/jdembowski/)
 * (@jdembowski)
 * Forum Moderator and Brute Squad
 * [11 years, 10 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113652)
 * > Basically I have a hacker (or maybe malware) which is gaining access to my 
   > wordpress site on a seemingly nightly basis.
 * It sounds like your site was compromised and you’ve not successfully deloused
   it yet.
 * You need to start working your way through these resources:
    [http://codex.wordpress.org/FAQ_My_site_was_hacked](http://codex.wordpress.org/FAQ_My_site_was_hacked)
   [http://wordpress.org/support/topic/268083#post-1065779](http://wordpress.org/support/topic/268083#post-1065779)
   [http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/](http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/)
   [http://ottopress.com/2009/hacked-wordpress-backdoors/](http://ottopress.com/2009/hacked-wordpress-backdoors/)
 * Additional Resources:
    [Hardening WordPress](http://codex.wordpress.org/Hardening_WordPress)
   [http://sitecheck.sucuri.net/scanner/](http://sitecheck.sucuri.net/scanner/) 
   [http://www.unmaskparasites.com/](http://www.unmaskparasites.com/) [http://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html](http://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html)
   [http://blog.sucuri.net/2010/07/understanding-and-cleaning-the-pharma-hack-on-wordpress.html](http://blog.sucuri.net/2010/07/understanding-and-cleaning-the-pharma-hack-on-wordpress.html)
 *  Thread Starter [Roadwolf](https://wordpress.org/support/users/roadwolf/)
 * (@roadwolf)
 * [11 years, 10 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113730)
 * I have read all of what Jan posted before. And re-reviewed the links, but they
   did not really help too much.
 * The “All In One WordPress Security Plugin” that Ross posted, I really like.
 * Taking all the information into consideration, I did a full filesystem wipe last
   night including all my uploads and other files not associated with WordPress.
   I Then changed databases, and database user/password (to randomized names). I
   scanned the old database and manually went thru it, looking at anything suspicious,
   deleting many tables which didn’t look legit vanilla wordpress.
 * I installed a fresh install of wordpress install from wordpress.org and a fresh
   new theme. linked to the new database. I did not upload anything else, and simply
   just got my blog working again.
 * Sure enough, tonight right on schedule, the file change scanner in the “All In
   One WordPress Security Plugin” informed me of file changes in every .php file
   in wordpress.
 * I am thinking there is a vulnerability within wordpress itself which is being
   exploited. This is also what my host is suggesting.
 *  [RossMitchell](https://wordpress.org/support/users/rossmitchell/)
 * (@rossmitchell)
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113754)
 * > I am thinking there is a vulnerability within wordpress itself which is being
   > exploited. This is also what my host is suggesting.
 * This is the kind of “support” one gets from lazy and incompetent hosting companies.
   Really roadwolf, if wordpress was such an easy hack, then we would all be getting
   the treatment you are unfortunately experiencing.
 * Trying to gather more information:
    What is your wordpress version ? What is 
   your PHP version ? What is your mysql version ? What is your apache version ?
   All this info is available in your hosting management panel.
 * Which theme are you using ?
 * I understand that your only plugins are akismet and allinonewordpresssecurity?
   Have you previously had other plugins installed ? Even if they are inactive, 
   code in them could still get activated (hence request to view logs below).
 * Can you examine the server access logs ? ESPECIALLY at the time these hacks occur.
   See which plugin files are being directly accessed, same for theme files.
    Are
   any of the lines strange or repetitive ?
 *  Moderator [Jan Dembowski](https://wordpress.org/support/users/jdembowski/)
 * (@jdembowski)
 * Forum Moderator and Brute Squad
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113756)
 * > This is the kind of “support” one gets from lazy and incompetent hosting companies.
 * _*Drinks more coffee*_
 * That’s not nice. Possibly accurate and spot on but you know. 😉
 * > if wordpress was such an easy hack, then we would all be getting the treatment
   > you are unfortunately experiencing.
 * Now THAT I can emphatically embrace. Even without the coffee. _*Drinks more anyway*_
 * [@roadwolf](https://wordpress.org/support/users/roadwolf/) A stock installation
   of just WordPress doesn’t have any vulnerabilities that are known at this time.
   When a WordPress security problem or even potential problem is named then 2 things
   happen.
    1. A patch is produced and WordPress blogs start getting updated automatically (
       minor releases number)
    2. A note goes out via [https://wordpress.org/news/](https://wordpress.org/news/)
       and that shows up on your WordPress dashboard by default
 * Which does nothing for plugin or theme exploits or worse poor hosts. Sadly there
   are hosts that only provide lip service to security and patching. Not all of 
   them but enough that your problem does occur.
 *  [bossbowser](https://wordpress.org/support/users/bossbowser/)
 * (@bossbowser)
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113757)
 * I had a very very similar thing that was down to a plugin using timthumb.php 
   which allowed a hacker to place images on the server AND bury code, giving them
   access. It drove me insane until after 2 weeks of head smashing I found it.
 * Scan your plugins and site for timthumb.php if found I believe my fix was a patch
   to update the security flaws within the plugin.
 * This is why I am very cautious when using plugins.
 * Hopefully this is your issue,
 * Good luck!
 *  [RossMitchell](https://wordpress.org/support/users/rossmitchell/)
 * (@rossmitchell)
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113761)
 * Breaking news is that there just may be a hack storm descending upon our wordpress
   universe.
    Best advice is get everything up to date.
 * I use “All in one wordpress security” plugin, highly advised.
    One of the things
   it scanns for is the notorious “timthumb” library.
 *  [bossbowser](https://wordpress.org/support/users/bossbowser/)
 * (@bossbowser)
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113764)
 * Ross can you post the source so we can read up on what may or may not be coming?
 *  [RossMitchell](https://wordpress.org/support/users/rossmitchell/)
 * (@rossmitchell)
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113765)
 * In this support forum, in the “hacks” section was this thread:
    [http://wordpress.org/support/topic/infected-php-cant-get-into-admin?replies=3](http://wordpress.org/support/topic/infected-php-cant-get-into-admin?replies=3)
 * A posting there refered to this:
 * [http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html](http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html)
 *  [bossbowser](https://wordpress.org/support/users/bossbowser/)
 * (@bossbowser)
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113766)
 * Another reason why I avoid plugins as much as I can! [@roadwolf](https://wordpress.org/support/users/roadwolf/)
   do you have the Mailpoet plugin installed or have had it previously installed?
 *  Thread Starter [Roadwolf](https://wordpress.org/support/users/roadwolf/)
 * (@roadwolf)
 * [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113768)
 * Sorry for my previous post.. It was a tad lazy on my part to post that. I didn’t
   mean any disrespect.
 * Since that post however I think I did find a deeply hidden php hack file (PHP_Nuke*),
   inside the root directory of my server, hidden inside cpanel files (great work
   hosting company!).
 * That being said I host several websites, and they all share that common root 
   directory. Only my main blog was being targeted. But then again, I do sometimes
   post some controversial content on my blog, and wouldn’t be surprised if this
   was someone who wanted it to disappear.
 * It has been secure since I discovered and removed that file, and did another 
   complete wipe, and install. I also changed the SQL database and deleted all the
   tables except my posts. Then imported my posts to the newly installed database.
   The “All In One WordPress Security Plugin” has been great in preventing further
   attacks however. It is reporting that I am getting over 1000 IP’s (likely proxies)
   attempting brute force ‘admin’ login hacks an hour. The login attempts have now
   switched to using ‘test’ as a login instead of admin. So it is someone who really
   wants to get in.
 * To answer some questions however:
 * “All In One WordPress Security Plugin” Plugin Version: 3.7.7
    WP Version: 3.9.1
   MySQL Version: 5.1.63 PHP Version: 5.2.17 Apache version 2.2.22
 * I am using the F2 Theme.
 * Blog is located at roadwolf.ca
 * I have not used or heard of the MailPoet plugin. The only real plugin I dealt
   with at one time aside from Akismet was the Jetpack plugin package.
 * My hacker goes by the name Moroccan Double Agent.

Viewing 12 replies - 1 through 12 (of 12 total)

The topic ‘Repeated Hacks at SQL Level.’ is closed to new replies.

## Tags

 * [hacks](https://wordpress.org/support/topic-tag/hacks/)
 * [sql](https://wordpress.org/support/topic-tag/sql/)

 * In: [Fixing WordPress](https://wordpress.org/support/forum/how-to-and-troubleshooting/)
 * 12 replies
 * 4 participants
 * Last reply from: [Roadwolf](https://wordpress.org/support/users/roadwolf/)
 * Last activity: [11 years, 9 months ago](https://wordpress.org/support/topic/repeated-hacks-at-sql-level/#post-5113768)
 * Status: not resolved

## Topics

### Topics with no replies

### Non-support topics

### Resolved topics

### Unresolved topics

### All topics
