Results 1 to 10 of 14

Thread: How to remove the malware attack in wordpress?

Hybrid View

  1. #1
    Join Date
    Dec 2012
    Posts
    392

    Default How to remove the malware attack in wordpress?

    Hi do you know how to remove malware attack on wordpress sites?

  2. #2
    Join Date
    Oct 2012
    Location
    California
    Posts
    15

    Default

    Sorry, I don't know about that but I am sure their must be some option about this in Wordpress. But can I know how and when malware attack on your website?

  3. #3
    Join Date
    Dec 2012
    Posts
    392

    Default

    what I mean is like this site http://4ghblogs.com/ that site has been infected by some malware.. do you have any idea how to remove that?

  4. #4

    Default

    Well, you should protect it with antivirus.
    The best Android app Development Company in Malaysia..!

  5. #5
    Join Date
    Jan 2013
    Posts
    11

    Default

    Quote Originally Posted by James Andy View Post
    Well, you should protect it with antivirus.
    if that is the kind of answer you will give for removing malware from a site, who will your php dev brand which you have added in your signature.

    The better way to remove the malware or any malicious code is to either recover/restore your site to an older date or save the database and then install a fresh wp porting the db on the new wp

  6. #6

    Default

    Here is some info to help you locate and remove a malware infection on your site (it's generic as we give it out to anyone that's been infected):

    Can’t find malware what do I do? If you don’t feel comfortable and don’t have a backup, I suggest that you just completely wipe your server and start over; otherwise you may continue to have problems.

    1) First, do you have a “clean” back-up of your site? By clean, I mean a backup that occurred at LEAST 1 week before you were notified of the issue. If so, just restore it from that (Make sure you DELETE everything from your server first or you may leave a backdoor on there).

    2) If #1 doesn’t apply, do the following, check all .htaccess files, index.php files and any include files or theme files you may be using. This will depend on if you are running wordpress, joomla, osCommerce, etc. for anything out of the ordinary (see #5 below). If you don’t find anything in your .htaccess file or .php files, start checking your .js files and directories. I would recommend using SSH/Grep for this but if you don’t have any experience with this or don’t have access, you can do it using FTP and opening the files – you CAN NOT do this using your site admin tools.

    3 ) If you have access to your server logs, it may help to look at those, but unfortunately most hosting companies rotate the logs every 24 hours so by the time it’s detected, all evidence is long gone.

    4) Check above your main web directory (usually above public_html, httpdocs, html, etc) for an .htaccess file that will override anything in your web directory.

    5) Remove any code that you find in your “legitimate” files that matches any of the following (Note – this isn’t an all exhaustive list, it’s the most common issues I’ve seen):
    a. “eval(base64_decode(…..”
    b. “edoced_46esab…”
    c. “getMama…”
    d. “115,99,114,105,112,116….”
    e. “document.write(‘<iframe…..”

    6) Look for any php files in any image, css, upload, download, etc directories that would not normally have a php file in them. Check the file contents for base64 strings and thing that point to it being a php shell such as “FilesMan”, “c999sh”. If you find files like this, DELETE THEM.

    7) UPGRADE your site immediately if you are not running the latest version to remove any possible publicly available vulnerability.

    8) Also I would recommend checking permissions; files should be at 644 and directories at 755 (this depends on your hosting company/server – this is the most common setting). Change your cPanel and FTP passwords. I would also recommend password protecting any administrative access to your site – password protect the directory for an extra layer of protection.

    9) After you have completed all those steps, go to google . com/webmasters and if you don’t already have an account create one (Obviously if you have one – skip this step).

    10) Once you’ve created your account, add your site, then on the left hand side, click on “Health”, “Malware” . If they have you flagged, and you have cleaned your site, submit it for re-evaluation. This usually will take between 24-48 hours before you are cleared.


    Hope this helps,

    Regards,

Similar Threads

  1. Which one is better Wordpress, Joomla or HTML??
    By davidwells in forum Web Design Solutions
    Replies: 33
    Last Post: 09-17-2017, 01:08 PM
  2. malware
    By Natcoweb in forum Web Hosting Solutions
    Replies: 0
    Last Post: 11-28-2012, 02:16 PM
  3. Is 48-14.com good for wordpress?
    By Youngman in forum Web Hosting Solutions
    Replies: 14
    Last Post: 04-11-2012, 08:52 AM
  4. Counter DDoS Attack with Professional Help
    By isson in forum Web Hosting and Related Offers Forum
    Replies: 0
    Last Post: 02-20-2012, 04:22 AM
  5. WordPress to use
    By vinrar in forum Web Hosting Solutions
    Replies: 8
    Last Post: 07-30-2010, 02:38 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •