• I installed Wordfence and changed my login passwords, along with my FTP password (I used a password generator) but my files are still getting hacked. I’m getting a few failed login attempt emails so I’m thinking it has to be the server. Any ideas on how to prevent this? I’m getting frustrated. I hate hackers!

Viewing 14 replies - 1 through 14 (of 14 total)
  • Thread Starter thinkdolphin

    (@thinkdolphin)

    Well, how do I go about getting rid of this backdoor? I’ve done everything in these articles.

    Is a wordfence scan coming up clean?

    Did you run a site check using the free sucuri website checker, too?

    If both of those are coming back as clean, what is it specifically that is making you think you’ve been hacked?

    • This reply was modified 7 years, 1 month ago by bluebearmedia.
    • This reply was modified 7 years, 1 month ago by bdbrown.
    Matt

    (@reallymattgray)

    It’s true. I have wordfence scans come up clean, anti-malware scan come up clean, and securi sitecheck finds nothing, but then code gets inserted into a wp-includes subfolder file.

    I even have all of these file names / directories set up for immediate blocking if they’re accessed:
    /ground.php?md7lk
    /site-rococ/08201024493.html
    /mod_fxprev/libraries/info.php
    /advantage.php
    /woman.php
    /appear.php
    /proceeded.php
    /one.php
    /light.php?yr
    /?author=1
    /?author=2
    /?author=3
    /?author=4
    /administrator/
    /wp-config.php
    /wp-login.php
    /nav-menu.php
    /wp-includes/nav-menu.php
    /xmlrpc.php
    /wp-admin
    /wp-admin.php
    /admin
    /user
    /installer.php
    /destination.php
    /action_hooks.php
    /bugslist.txt
    /font-uploader-free.php
    /functions.php
    /cat_grid.php
    /fm.php
    /lgpl.txt
    /wp-e-commerce/license.txt
    /user-meta/readme.txt
    /fcchat/default.png
    /MF_Constant.php
    /nextgen-gallery/changelog.txt
    /font-uploader-free.php
    /wp-homepage-slideshow/functions.php
    /ckeditor.config.js
    /custom-content-type-manager/index.html
    /action_hooks.php
    /gallery-plugin.php
    /admin.css
    /cat_grid.php
    /user-avatar/readme.txt
    /ninja_forms.php
    /wp-e-commerce/license.txt
    /nmedia-user-file-uploader/readme.txt
    /user-meta/readme.txt
    /AWPCP.po
    /a-a.css
    /simple-dropbox-upload-form/index.php
    /ckeditor.config.js
    /contact-form-7/license.txt
    /nmedia-user-file-uploader/readme.txt
    /README_OFFICIAL.txt
    /wpmarketplace/readme.txt
    /changelog.txt
    /wp-editor/
    /readme.txt
    /sketch/
    /269
    /wp/v2/posts/
    /wp-smtp.php?c
    /gaukingo/db.php
    /ubh/up.php

    Thread Starter thinkdolphin

    (@thinkdolphin)

    No, they aren’t coming back as clean. And I can’t figure out why that could be. I’ve changed every password. No admin username. All are generated passwords. So, why would there still be hacked files?

    @thinkdolphin – Because there may be a backdoor that hackers have already established.

    If the scans are not coming back clean, what are they telling you? (They usually indicate at least the name of the potential infection…) There are multiple approaches depending on what the infection/malware is.

    Honestly, from your questions, it doesn’t sound like you’re a web development person – nothing wrong with that – but if that is case, cleaning a hacked site is probably beyond your technical abilities and you should likely look into hiring someone to do the cleanup.

    Wordfence also provides web site hack recovery – more info at their website.

    (NOTE: I am not part of WF support – I’m simply a long-time user. My views are my own.)

    @reallymattgray – You may want to start your own thread – since you seemed to have jumped in this one randomly with no details or other information to precede it.

    Matt

    (@reallymattgray)

    @bluebearmedia, confused. Did “It’s true”, referring to @thinkdolphin ‘s previous comment regarding clean scans, not tie my comment into the current thread as a relevant furtherance of the discussion at hand?

    Certainly my reference to your previous comment (WF scan, and Securi), was relevant.

    Is there some unpublished rule that I needed to make a previous comment in order to provide the information I provided? Is there some ‘warm up’ comment needed?

    Since the form and function of this thread is about hacks and scans and presumably solving those issues, how is my post improper in your view?

    Please explain, so I can understand. I don’t wish to offend.

    Matt

    (@reallymattgray)

    @Bluebeardmedia, please, let’s explore your expertise… because I just love passive aggressive sniping without any constructive feedback that actually addresses the purpose for my post.

    You, as a “long time user”, would not install anti-malware? Or you would not have expanded the prohibited directories and files list on WF? Or you would not have run a WF scan? Or you would not have run a Securi scan?

    Because THAT is the entirety of my post. So I’m just curious what a long time user such as yourself would have done differently.

    Beyond that, I’ve cleaned the sites and changed all usernames & passwords, with entire wipes of the directories and fresh installs with freshly downloaded packaged WP and plugins zipped and uploaded, and fresh SQL database installs. My computer has been exhaustively scanned by me and a local shop. Maybe you know of a more fool proof method?

    So I say there’s a problem, and your response is that I must not have the experience to find my own ass in the dark with both hands. Please, by all means, explain what else you would have done…

    • This reply was modified 7 years, 1 month ago by Matt.

    Wow – a little touchy??? From quick reading, it just seemed to me that you might have erroneously posted in the thread….

    But seriously, calm down – no one was sniping at you. I simply mistook the intent of your post is all… yikes!

    As to suspecting a hack when nothing is being reported; Wordfence and Sucuri are tools – they don’t do all the work for you. And nothing is foolproof.

    If you suspect a hack but are not seeing obvious notifications from security s/w, then you’d have to start exploring what you perceived to be files that have changed to determine a possible signature that allows you to identify what the hack might be. Again, until you can do that, it’s impossible to determine a suitable course of action.

    It’s also possible that the hack is occurring above your website at the server level. So you may also have to get your webhost involved in checking. Case in point, I had a client whose mail credentials were compromised – their WordPress site wasn’t hacked itself per se, but many spam emails were appearing in their WP uploads directory. The leak had to be closed at the host level, not the site level.

    Again, in that case, your webhosts are going to ask you the same kind of question – what hack “symptoms” are you seeing? Until you determine WHAT, you can’t fix the HOW…

    Thread Starter thinkdolphin

    (@thinkdolphin)

    Okay, this is my thread and I’m glad @reallymattgray posted. Can we not get snarky about it and get to the issues at hand here.

    @bluebearmedia thank you for your comments. I actually AM a web developer and I know how to clean a site. What I’m trying to tell you is, I have done everything and my site is still getting hacked. It appears to be a “supp2 infection”.

    @thinkdolphin, in that case, if I had to deal with it – here’s my approach:

    1 – Lock down the site using htaccess, allowing access only from your own IP

    2 – Perform a full site backup….

    3 – Re-install WordPress core files from a known, clean copy…

    4 – Delete all theme and plug-in files and reload from clean copies…
    (and make sure the plug-ins & theme you are using are not currently known to have security holes – if there are some compromised plug-ins in place on your site then you cannot use them – unless you like getting infected!)

    5 – Restore your uploads directory from known, clean copies…

    6 – Run Wordfence on the freshly installed files…

    7 – Restore site access (reset your htaccess)….

    If the infection re-occurs, you’re going to have to find the affected files by manual comparison/searching… it is not a short process, by any means. Having said that, it’s extremely likely that the source of the infection is a compromised plug-in.

    Also – a quick google search showed the following that has more info:
    https://wordpress.org/support/topic/re-scan-result/

    And very useeful – the WP Vulnerability DB – lists all known security holes: https://wpvulndb.com/

    Thread Starter thinkdolphin

    (@thinkdolphin)

    I think you’re right about the plugin. I did another scan and a plugin was found with some malicious code so I just deleted it. Hopefully this does the trick. Thanks again for your help!

    Matt

    (@reallymattgray)

    @thinkdolphin, WF just released an article which coincides with GoDaddy making some recent changes, and alerting customers to new efforts on identifying malware.

    Cf.

Viewing 14 replies - 1 through 14 (of 14 total)
  • The topic ‘Still getting hacked’ is closed to new replies.