Sites keep getting hacked–executable upload
-
Hi folks,
I’m somewhat responsible for a multitude of WP installs on many different servers (some of which I don’t directly administer).
Each of these installs range from 100% up-to-date to slightly out-of-date (no more than a couple point releases behind). Some have lots of plugins, others have only the two default. In one case, a bone-stock, unused install was even involved.
On June 2nd, a rash of compromises hit a server I directly manage. I’ve got it all cleaned up, but I need to figure out how to prevent this.
As far as I can tell, a zip file is getting uploaded either to the plugin folder or the upload folder. Somehow, this zip file is getting unpacked, resulting in a PHP file. This file is an uploader script, so from there, they have total control over the account.
What I don’t get is how in the world they are able to upload this file to begin with?
Server is cPanel-run, with up-to-date LAMP stack. SuPHP is active on all accounts, and they are all jailshelled. Permissions are set according to the WP hardening guide (755 directories, 644 files). I can verify all of this was already set prior to the attack.
The topic ‘Sites keep getting hacked–executable upload’ is closed to new replies.