![]() |
Malware removal service
There must be some vulnerability in the server I use or I don't know what's the cause, but my sites are being flagged with google malware warning. I also see some nasty .php files being randomly added to some of my websites. Both wordpress and plain html.
Any of you guys know of a reliable service that'll clean this shit for me and patch the vulnerabilty so it won't happen in the future ? |
Tpl files in wp ate mostly infected with this which finally effect html files or php files...you need to contact host to clear this for you... Its called injection....
|
This makes sense, unfortunately my host , I won't name it here, is not so good at doing anything more complicated. You think I should push them to get this done ?
|
Quote:
|
Quote:
|
Maybe your ftp password got stolen (in case you had stored it in Total Commander or similar) via a malware?
|
Sloppy PHP coding -- use PDO
Inputing user submitted data the right way: PHP: PDO - Manual This is probably beyond the scope of your abilities but the developers creating the code for your API should know better. This is a nice blog article in more layman terms: a2z notes: Introduction to PDO Here is a long read on the SQL injection vulnerabilities in PHP query language. mysql - How can I prevent SQL-injection in PHP? - Stack Overflow |
ProntoAdmin | On Demand Server Administration
Hosts aren't really responsible for your content. Some might be willing to help but when there is a recurring problem, most of them are going to tell you to get it figured out or they are going to shut you down. |
Quote:
Tom |
Quote:
If there were malicious files found somewhere, deleting them isn't going to make much difference. They will just keep returning until whatever allowed them to be uploaded is fixed. Most of the time it's a vulnerable WP theme or plugin and in that case, it's absolutely not something the host should be messing with. A lot of fledgling hosting companies will do this but those are typically the ones who haven't had a lesson in liability yet. |
Quote:
|
Quote:
|
I could check it for you. Email me or contact me on ICQ.
I could do it live with you on TeamViewer or a similar tool. Don't trust anybody requesting ssh, ftp or admin access to your server without you monitoring their actions and them giving you a full report... It'll probably get you in more trouble than you're in. |
Quote:
They may change hardware, monitor system updates, install scripts, but I would never expect them to work on client code without compensation. If they do, you're probably paying too much for hosting monthly. |
It usually comes all from a single php file that reupload the bad files you see when you delete them and reinsert nasty codes into your html files.
Open one of your site and look at the source code of the page, check it without javascript enabled if your afraid of getting a virus, find an include which don't belong there, if it's encoded with eval (most of the time), decode it here HTML & JavaScript Encoder/Decoder. Then look at the path of the php include file inside that code. Find that file and delete it (its the main file). Then run ComboFix on your computer to make sure you don't have any backdoor virus. That you got while watching porn :1orglaugh Then change your FTP, Cpanel (whatever), root password for your server. Got those a few times and this is how i got ride of them... |
I had lots of malware problems years ago on shared hosting, always WordPress. I spent many hours fixing it only to have them back in via a back door, but as a quick and dirty fix most (WP) problems disappear if you disable the php eval function.
|
Quote:
|
All times are GMT -7. The time now is 06:30 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123