Posted: November 21, 2014 at 1:45 pm
|
Current site stats: Our site running EE4 was attacked with some phishing code after the latest WordPress auto update last night. We’re trying to get things cleaned up so we can get the site cleared with Google. Google reported that our compromised pages were our main page and the one event page we have generated through EE. These pages were injected with code from combatwriter.com, invoice-ups.net, and sweetcakesweb.net. We found and deleted the following code from wp-blog-header.php and haven’t been able to find any other references or usual files anywhere else:
Things get a little tricky here, but these were my next basic steps trying to clean up any potential bad files in WordPress: 1. Updated all plug-ins Using the All-in-One WP Migration as sort of a litmus test, the change from a non-malicious backup file to a malicious one only after EE4 is re-installed makes me wonder whether something in EE4 is involved with our phishing attack and is still an issue. Our EE4 was a few versions out of date when the attack happened, so I’m wondering if that had something to do with it. Any guidance you have on this issue would be greatly appreciated. We don’t have much experience with WordPress hacking and want to make sure we get everything cleared up properly. |
Hi Natalie, EE4 is not involved with the phishing attack. Other sites that do not run EE4 have reported the same attack where a general backdoor vulnerability allowed access to the web server and the attacker injected their scripts into post content. In your case, some iframe code was injected into an event page and your main page. This is an attack that’s been around before Event Espresso was available as a plugin. Here is a link to notable discussion on this iframe hack vulnerability that was posted in the WordPress.org forums five years ago: https://wordpress.org/support/topic/iframe-hack-on-several-wp-sites If your backup files include a backup of the database, and if the database has the injected iframe code, then the database needs to be cleaned up as well. I recommend contacting Sucuri or another reputable developer who specializes in cleaning up sites to make sure thing get cleaned up. I can also recommended to run scans on the PCs that FTP in or log in to your WordPress site. It’s also important to change the passwords for WordPress and FTP log ins. |
|
The support post ‘Phishing attack on event page, plugin causes malicious backup file’ is closed to new replies.
Have a question about this support post? Create a new support post in our support forums and include a link to this existing support post so we can help you.