Title: Dan's Replies | WordPress.org

---

# Dan

  [  ](https://wordpress.org/support/users/securitydan/)

 *   [Profile](https://wordpress.org/support/users/securitydan/)
 *   [Topics Started](https://wordpress.org/support/users/securitydan/topics/)
 *   [Replies Created](https://wordpress.org/support/users/securitydan/replies/)
 *   [Reviews Written](https://wordpress.org/support/users/securitydan/reviews/)
 *   [Topics Replied To](https://wordpress.org/support/users/securitydan/replied-to/)
 *   [Engagements](https://wordpress.org/support/users/securitydan/engagements/)
 *   [Favorites](https://wordpress.org/support/users/securitydan/favorites/)

 Search replies:

## Forum Replies Created

Viewing 9 replies - 1 through 9 (of 9 total)

 *   Forum: [Plugins](https://wordpress.org/support/forum/plugins-and-hacks/)
    In
   reply to: [A malicious crawler is attacking to theme-compat](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 4 months ago](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/#post-6845426)
 * Hey,
 * Those are good recommendations for implementing general security around a website,
   but unfortunately they will not completely fix your problem. By getting a SSL
   certificate, it will create an encrypted connection between your site visitors
   and your website. All of those connections will remain private and the data will
   be encrypted. This is a good practice, but it won’t stop the incoming connections
   coming to your server. It would be beneficial to have this for your site in the
   future, but it won’t resolve this issue.
 * The cloud based CDN/firewall services could help in your situation, but so will
   other free plugins. You should be able to use the free version of Wordfence to
   block based off that URI pattern. As long as the malware is out there and machines
   are still infected, you will receive these same incoming connections. Are you
   receiving any extra bandwidth costs with these incoming connections? If you go
   with this option, I would ask these companies if they have ran into this situation
   before and if they have any recommendations. You don’t want to just be blocking
   traffic all the time at this scale, ideally you don’t want any of this traffic
   coming to your site.
 * This is a really unique problem and unfortunately I don’t see the how you can
   resolve the issue without changing your domain name. With the constant incoming
   connections from over 400 machines and the negative reputation on the Internet
   with this domain, I would recommend a new domain. You could slowly migrate traffic
   over to the new domain then eventually shut this domain off.
 * [https://www.virustotal.com/en/url/e973ee67ab56c270d8f104e19ba80fb3f8505e014174812eb0afb7a61e09c0fe/analysis/1450839306/](https://www.virustotal.com/en/url/e973ee67ab56c270d8f104e19ba80fb3f8505e014174812eb0afb7a61e09c0fe/analysis/1450839306/)
 *   Forum: [Networking WordPress](https://wordpress.org/support/forum/multisite/)
   
   In reply to: [Multisite network malware – redirection to another site when browsed via mobile](https://wordpress.org/support/topic/multisite-network-malware-redirection-to-another-site-when-browsed-via-mobile/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 4 months ago](https://wordpress.org/support/topic/multisite-network-malware-redirection-to-another-site-when-browsed-via-mobile/#post-6870792)
 * Yes, these are known as conditional redirects. The malicious redirect will only
   happen when certain conditions are met based on different attributes of the connecting
   machine. Most of these conditions are based on the referrer, user agent, cookie
   or operating system. In your case, the user agent field is most likely being 
   used to identify mobile devices.
 * If you are using Apache, a lot of the attackers will modify the htaccess file
   to set up these re-directs. Sometimes, the redirect with all the conditional 
   logic will be injected on a homepage of a website. With these injections, the
   code is usually heavily obfuscated to avoid detection.
 * Here’s a good article by Sucuri of a recent campaign using conditionals redirects.
 * [https://blog.sucuri.net/2015/09/wordpress-malware-active-visitortracker-campaign.html](https://blog.sucuri.net/2015/09/wordpress-malware-active-visitortracker-campaign.html)
 *   Forum: [Plugins](https://wordpress.org/support/forum/plugins-and-hacks/)
    In
   reply to: [A malicious crawler is attacking to theme-compat](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 5 months ago](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/#post-6845408)
 * Your domain has been published online in different malware samples by various
   people around June/July 2015. Victims of this malware probably Cryptowall are
   unknowingly making connection attempts to your domain. I checked your logs and
   I see over 400 different IP’s attempting to make that similar POST request with
   the “e5.php” file within a 24-hour period . These IP’s are coming from all over
   the world. This kind of behavior is indicative of the malware attempting to “
   phone home” or call back to a command and control server. It appears you patched
   over the vulnerability so now the traffic is still coming to your site, but the
   requests are being denied since that file does not exist. You will want to work
   with GoDaddy by reporting this information and linking this support post as well
   as those access logs. Probably, your best solution if possible is to move away
   from this domain. GoDaddy might have other suggestions, but from my perspective
   as long as that domain is up you will be receiving this same traffic for awhile.
   Your domain may get blacklisted or receive negative reputation in the future 
   for being associated with this activity so it’s probably smarter to just move
   on from this domain.
 * References:
    [https://malwr.com/analysis/YWUxZmNhMGFmOTY3NDhkYTliZDExYTJkYmEyYmFhN2Q/](https://malwr.com/analysis/YWUxZmNhMGFmOTY3NDhkYTliZDExYTJkYmEyYmFhN2Q/)
   [https://www.hybrid-analysis.com/sample/f27e7bd5ff01e213ecac0c873a02458ebac3c49d9bc8d2f18abb71973fbcd85c?environmentId=3](https://www.hybrid-analysis.com/sample/f27e7bd5ff01e213ecac0c873a02458ebac3c49d9bc8d2f18abb71973fbcd85c?environmentId=3)
   [https://www.threatcrowd.org/domain.php?domain=mggproperties.com](https://www.threatcrowd.org/domain.php?domain=mggproperties.com)
 *   Forum: [Plugins](https://wordpress.org/support/forum/plugins-and-hacks/)
    In
   reply to: [A malicious crawler is attacking to theme-compat](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 5 months ago](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/#post-6845387)
 * Is the traffic still occurring today? Do you mind providing the frequency of 
   these connection requests with that similar pattern (/wp-includes/theme-compat/
   e5.php?…)? For example 20 different unique IP’s are attempting to connect in 
   5 minutes?
 * I am not so sure that you want to mess with that traffic and re-direct it back
   to your homepage. I asked the Wordfence support team and they generously suggested
   to use the Wordfence option under the “Options” page then under “Other Options”
   use setting “Immediately block IP’s that access these URLs” and then include 
   the URI like the example below:
 * /wp-includes/theme-compat/e5.php*
 * Have you done any kind of scanning on your site using Wordfence just to make 
   sure there is nothing buried beneath your site? Wordfence recommended to use 
   these settings during the scan.
 * • Scan file contents for backdoors, trojans and suspicious code
    • Scan file 
   contents for backdoors, trojans and suspicious code • Scan database for backdoors,
   trojans and suspicious code • Scan files outside your WordPress installation •
   Scan images and binary files as if they were executable • Disable Code Execution
   for Uploads directory • Scan theme files against repository versions for changes•
   Scan plugin files against repository versions for changes
 * I thought this might be external scanning activity, but the different ranges 
   of IP addresses and the URI match many of the known patterns with Cryptowall.
   If this is the case, there isn’t exactly a way to remove your domain from their
   list since these are malicious users with bad intention. They might have the 
   domain hard-coded into their malware or there is a script that scans for particular
   characteristic that matches with your website.
 * [https://malwr.com/analysis/YmE4YzNmYzQ1OTBjNDAxOGFmZDRkODdhMDVkZjgyMDI/](https://malwr.com/analysis/YmE4YzNmYzQ1OTBjNDAxOGFmZDRkODdhMDVkZjgyMDI/)
   
   [https://www.virustotal.com/en/file/f5b3abfb3e4c1a5fba6a4e170b95d7ea7c87a398882932a467fbea78e82f36fa/analysis/](https://www.virustotal.com/en/file/f5b3abfb3e4c1a5fba6a4e170b95d7ea7c87a398882932a467fbea78e82f36fa/analysis/)
 * If it’s possible to provide the domain, I might be able to look up a little more
   information and see if any AV vendors have seen your domain out there. The best
   thing you can do is block these requests for the time being and verify your site
   is completely clean.
 *   Forum: [Plugins](https://wordpress.org/support/forum/plugins-and-hacks/)
    In
   reply to: [A malicious crawler is attacking to theme-compat](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 5 months ago](https://wordpress.org/support/topic/a-malicious-crawler-is-attacking-to-theme-compat/#post-6845285)
 * Hi LFCmongolia,
 * Unfortunately, it looks your website has been turned into a command and control
   server where other machines that have been infected by Cryptowall try to communicate
   with your website and send data back and forth. When you looked for the e5.php
   file did you show hidden files as well? I see WordFence is showing they are trying
   to access non-existent pages, but do you know what the HTTP status code in the
   logs such as 404 or 200? If you can’t find the file anywhere, then it looks like
   your domain is programmed with the malware into a large list of other compromised
   domains. One of the steps you can take after you clean and harden your site is
   to work with your hosting provider and ask them for advice.
 * You will want to start going through the standard documentation from WordPress
   to harden your site and figure out how your site got tied into this. I have included
   some links to get you started.
 * References:
    [http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_crypwall.xxrv](http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_crypwall.xxrv)
   [http://codex.wordpress.org/FAQ_My_site_was_hacked](http://codex.wordpress.org/FAQ_My_site_was_hacked)
   [http://codex.wordpress.org/Hardening_WordPress](http://codex.wordpress.org/Hardening_WordPress)
 *   Forum: [Fixing WordPress](https://wordpress.org/support/forum/how-to-and-troubleshooting/)
   
   In reply to: [Admin Login not working & odd script all over page? Help!](https://wordpress.org/support/topic/admin-login-not-working-odd-script-all-over-page-help/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 5 months ago](https://wordpress.org/support/topic/admin-login-not-working-odd-script-all-over-page-help/#post-6779849)
 * If you want, you can send me some of the web server access logs and I can take
   a look for you. More than likely, there was an outdated theme or plugin vulnerability
   that they exploited. Like Tara mentioned to find these kinds of infections, you
   basically have to go through a checklist to cover all your bases to make sure
   it won’t come back again.
 * _**[Contact email address deleted: See [http://codex.wordpress.org/Forum\_Welcome#The\_Bad\_Stuff%5D](http://codex.wordpress.org/Forum_Welcome#The_Bad_Stuff%5D)**_
 *   Forum: [Fixing WordPress](https://wordpress.org/support/forum/how-to-and-troubleshooting/)
   
   In reply to: [Site has been compromised!](https://wordpress.org/support/topic/site-has-been-compromised/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 6 months ago](https://wordpress.org/support/topic/site-has-been-compromised/#post-6676130)
 * I just used vURL and went to your website. On your home page (index) on line 
   342, you have an injected iframe redirecting to an exploit kit hosted on IP (
   [188.166.65.14](https://www.virustotal.com/en/ip-address/188.166.65.14/information/)).
 * You can delete the iframe to temporarily stop the damage, but in order to completely
   remove any potential backdoors, you will want to scan the entire site, check 
   for recent changes, verify permissions, change all passwords related to the site,
   try to improve your .htaccess page. The two links provided above by Tara and 
   rngdmstr’s advice should help move you in the right direction.
 *   Forum: [Plugins](https://wordpress.org/support/forum/plugins-and-hacks/)
    In
   reply to: [[Portfolio Gallery - Photo Gallery] Malware Injection](https://wordpress.org/support/topic/malware-injection/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 6 months ago](https://wordpress.org/support/topic/malware-injection/#post-6598293)
 * Hey Hawthorne,
 * The code was most likely injected into the webpages by a malicious party. It 
   was not written by the plugin writer. They will usually find a vulnerability 
   in a plugin and compromise hundreds of sites at once. Krusader has a search function
   that is very similar to grep. If you go to the General tab on KruSearcher at 
   the bottom where it says “Containing text”, you should be able to enter specific
   text in there and it will perform a content search in the directories you specified.
   The CURL output that I received was based on rcriche’s website. It’s very possible
   there could be a different kind of exploit on your site, so you may need to search
   for a different keyword. I would also recommend downloading a reputable WordPress
   security plugin like Sucuri Security or Anti-Malware by ELI that can scan your
   site and flag malicious files.
 * Here are some helpful links:
 * [http://www.krusader.org/documentation/krusearcher.html](http://www.krusader.org/documentation/krusearcher.html)
   
   [Anti-Malware and Brute-Force Security by ELI](https://wordpress.org/plugins/gotmls/)
   [Sucuri Scanner](https://wordpress.org/plugins/sucuri-scanner/)
 * Hope that helps.
 *   Forum: [Plugins](https://wordpress.org/support/forum/plugins-and-hacks/)
    In
   reply to: [[Portfolio Gallery - Photo Gallery] Malware Injection](https://wordpress.org/support/topic/malware-injection/)
 *  [Dan](https://wordpress.org/support/users/securitydan/)
 * (@securitydan)
 * [10 years, 6 months ago](https://wordpress.org/support/topic/malware-injection/#post-6598291)
 * Hi,
 * I used Online CURL to grab the contents of the Javascript file (portfolio-all.
   js) you mentioned above. The first line of this file includes the malicious obfuscated
   code. The code appears to be related to the recent [VisitorTracker campaign](https://blog.sucuri.net/2015/09/wordpress-malware-active-visitortracker-campaign.html)
   highlighted by Sucuri. If a browser is vulnerable and successfully goes through
   the infection chain, the re-direction goes to this malicious domain (dgdsgweewtew.
   cf) hosting an exploit kit. Most likely, they targeted a vulnerability in one
   of your plugins.
 * For mitigation, you can try reviewing the timestamps of each webpage to identify
   which pages were modified recently and delete the exploit code. If you can search
   or grep across the server, you may try the keyword “eval(function(p,a,c,k,e,d)”.
   That is the beginning of the exploit code. It is highly likely there is more 
   than one page that is impacted. Make sure to persistently check through all files
   under the website directory, update plugins and change passwords. I have copied
   the CURL output on the pastebin link as well as some helpful material by WordPress
   to move forward and take back your site.
 * [http://pastebin.com/5pe3WCHF](http://pastebin.com/5pe3WCHF)
    [https://codex.wordpress.org/FAQ_My_site_was_hacked](https://codex.wordpress.org/FAQ_My_site_was_hacked)

Viewing 9 replies - 1 through 9 (of 9 total)