Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Wordpress site hacked

  • 26-05-2013 3:33am
    #1
    Registered Users, Registered Users 2 Posts: 3,050 ✭✭✭


    A Wordpress site I helped someone set up is giving a malware alert in Chrome and seems to be coming as an attack page in Firefox, it's a virus using the blackhole exploit kit according to my own AVG threat scanner. When I check the URL in Sucuri it comes up fine and the same for AVG. I have no idea whatsoever about web security, I'm going to just to go with a clean reinstall for the sake of it; there's not an enormous amount of stuff on the site so it looks the easiest way. But am I OK to log into the Wordpress site backend or will I need to go through my hosting account to get all my stuff like pictures, posts, etc?


Comments

  • Registered Users, Registered Users 2 Posts: 686 ✭✭✭DieselPowered


    Do you know how to FTP to your website root or the hosting location for the website? This will be the easiest way to get your pictures back to your computer before you upload them again to the new fresh install.

    If you're not sure you're hosting control panel should explain how to connect via FTP (you will need the FTP IP Address of your account, a user name and password).

    If you don't have an FTP program, look at something like Core FTP (google it).

    on your new install change the default login user name from admin to something else and make the passwords complex
    to avoid some of the security issues with wordpress.


    thanks


  • Registered Users, Registered Users 2 Posts: 3,050 ✭✭✭token101


    Yeah I used FTP when I uploaded the site (I think), I was using Fillezilla if I remember. I was doing the whole thing for a friend and I pretty much passed the entire thing over to her when I was done with putting the site live, so I can't really remember any of the hosting acc login details all I have is my own details for logging into the backend of Wordpress which I only found by chance.
    FTP IP Address of your account, a user name and password)

    I'm assuming that the username and password there would those of my hosting account and not the site backend?

    Yeah, I never changed the site backend username from admin, that's what ****ed me I reckon. I had fairly secure passwords, but I never realised that having a default username would be problematic.

    Thanks for that anyway, appreciated.


  • Registered Users, Registered Users 2 Posts: 686 ✭✭✭DieselPowered


    token101 wrote: »
    I'm assuming that the username and password there would those of my hosting account and not the site backend?

    No, the FTP access will be a different login to both your hosting account and your website admin login.

    You should be able to find it by logging into your hosting account, click on the domain you have hosted (for this website) and then there should be an option for FTP...or you may need to either re-enable FTP access or 'reset' your password for FTP access.

    If you can't find it, google the hosting account provider who ever you are using and then search on Google to see how to they use FTP (each provider can use a different control panel, but the majority can be pretty similar).

    eg google....'hosting nameofISP how to access my site via FTP' or something similar. Most will have detailed instructions on how to set it up/reset the password etc.


    Thanks


  • Registered Users, Registered Users 2 Posts: 367 ✭✭900913


    A new sophisticated and stealthy Apache backdoor meant to drive traffic to malicious websites serving Blackhole exploit kit widely has been detected by Sucuri recently. Researchers claimed that this backdoor affecting hundreds of web servers right now.

    Dubbed Linux/Cdorked.A, one of the most sophisticated Apache backdoors we have seen so far. The backdoor leaves no traces of compromised hosts on the hard drive other than its modified httpd binary, thereby complicating forensics analysis. All of the information related to the backdoor is stored in shared memory.

    Link:
    http://thehackernews.com/2013/04/new-apache-backdoor-serving-blackhole.html


  • Registered Users, Registered Users 2 Posts: 37,485 ✭✭✭✭Khannie


    That is a very impressive little backdoor. Very impressive.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 686 ✭✭✭DieselPowered


    Is there an easy fix to the backdoor? didn't read into it.


Advertisement