Help needed for hacked site
-
My site has been hacked and my hosting company keeps telling me it’s perfectly fine and won’t help just because nothing shows up on Sucuri Site Check. Wordfence has found all these new issues, including back door and various infections. I just realized the hacker deleted my Yoast SEO plug in and the problem list includes plugins I don’t have/never installed. I see that there are things whitelisted in Wordfence that I never approved either. Even things that I don’t even use on my site and never have. I have no idea how to fix any of this myself. I’ve taken all the security measures that everyone says to do to secure a site from the beginning and yet this is happening. Here are the issues Wordfence is showing:
File appears to be malicious: wp-includes/js/jquery/ui/dirs58.php
Filename: wp-includes/js/jquery/ui/dirs58.php
File type: Not a core, theme or plugin file.
Issue first detected: 10 secs ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “@$GLOBALS[$GLOBALS[‘m7f2ce’][75].$GLOBALS[‘m7f2ce’][55].$GLOBALS[‘m7f2ce’][72]”. The infection type is: supp2 infection
Tools:View the file. Delete this file (can’t be undone).
Select for bulk delete
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.File appears to be malicious: wp-content/wflogs/error.php
Filename: wp-content/wflogs/error.php
File type: Not a core, theme or plugin file.
Issue first detected: 10 secs ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “$yjr=$_COOKIE; $xib=$yjr[jctc]; if($xib){ $pdzcp=$xib($yjr[pbaq]);$ustr=$xib($yjr[mxrs]);$voup=$pdzcp(“”,$ustr);$voup(“. The infection type is: G212 – variation 2Tools:View the file. Delete this file (can’t be undone).
Select for bulk delete
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.File appears to be malicious: wp-content/plugins/wordpress-seo/wp-seo.php
Filename: wp-content/plugins/wordpress-seo/wp-seo.php
File type: Not a core, theme or plugin file.
Issue first detected: 10 secs ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “eval($b5196aa[$j24c0b1c3[‘ye46ba088’][27”. The infection type is: BackdoorTools:View the file. Delete this file (can’t be undone).
Select for bulk delete
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.File appears to be malicious: wp-content/plugins/wordpress-seo/frontend/search70.php
Filename: wp-content/plugins/wordpress-seo/frontend/search70.php
File type: Not a core, theme or plugin file.
Issue first detected: 10 secs ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “@$GLOBALS[$GLOBALS[‘oe4bbc9’][26].$GLOBALS[‘oe4bbc9’][63].$GLOBALS[‘oe4bbc9’][69]”. The infection type is: supp2 infectionTools:View the file. Delete this file (can’t be undone).
Select for bulk delete
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.File appears to be malicious: wp-content/plugins/wordfence/lib/menu_whois.php
Filename: wp-content/plugins/wordfence/lib/menu_whois.php
File type: Plugin
Issue first detected: 10 secs ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “eval($g889c997[$r2d67ab[‘v899ef’][24”. The infection type is: BackdoorTools:View the file. Restore the original version of this file. See how the file has changed.
Select for bulk repair
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.File appears to be malicious: wp-content/plugins/mojo-marketplace-wp-plugin/tests/title.php
Filename: wp-content/plugins/mojo-marketplace-wp-plugin/tests/title.php
File type: Not a core, theme or plugin file.
Issue first detected: 10 secs ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “@$GLOBALS[$GLOBALS[‘db2524928’][95].$GLOBALS[‘db2524928’][32].$GLOBALS[‘db2524928’][78]”. The infection type is: supp2 infectionTools:View the file. Delete this file (can’t be undone).
Select for bulk delete
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.File appears to be malicious: wp-content/plugins/jetpack/class.frame-nonce-preview.php
Filename: wp-content/plugins/jetpack/class.frame-nonce-preview.php
File type: Plugin
Issue first detected: 10 secs ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “eval($qd23264[$lbef4fa8c[‘of4d4eaf7’][3”. The infection type is: BackdoorTools:View the file. Restore the original version of this file. See how the file has changed.
Select for bulk repair
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.
Unknown file in WordPress core: wp-includes/js/jquery/ui/dirs58.phpFilename: wp-includes/js/jquery/ui/dirs58.php
File type: Core
Issue first detected: 31 secs ago.
Severity: Warning
Status New
This file is in a WordPress core location but is not distributed with this version of WordPress. This is usually due to it being left over from a previous WordPress update, but it may also have been added by another plugin or a malicious file added by an attacker.Tools:View the file. Delete this file (can’t be undone).
Select for bulk delete
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.
Modified plugin file: wp-content/plugins/wordfence/lib/menu_whois.phpFilename: wp-content/plugins/wordfence/lib/menu_whois.php
File type: Plugin
Issue first detected: 1 min ago.
Severity: Warning
Status New
This file belongs to plugin “Wordfence Security” version “6.1.17” and has been modified from the file that is distributed by www.ads-software.com for this version. Please use the link to see how the file has changed. If you have modified this file yourself, you can safely ignore this warning. If you see a lot of changed files in a plugin that have been made by the author, then try uninstalling and reinstalling the plugin to force an upgrade. Doing this is a workaround for plugin authors who don’t manage their code correctly. [See our FAQ on https://www.wordfence.com for more info]Tools:View the file. Restore the original version of this file. See how the file has changed.
Select for bulk repair
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.
Modified plugin file: wp-content/plugins/jetpack/class.frame-nonce-preview.phpFilename: wp-content/plugins/jetpack/class.frame-nonce-preview.php
File type: Plugin
Issue first detected: 1 min ago.
Severity: Warning
Status New
This file belongs to plugin “Jetpack by WordPress.com” version “4.3.1” and has been modified from the file that is distributed by www.ads-software.com for this version. Please use the link to see how the file has changed. If you have modified this file yourself, you can safely ignore this warning. If you see a lot of changed files in a plugin that have been made by the author, then try uninstalling and reinstalling the plugin to force an upgrade. Doing this is a workaround for plugin authors who don’t manage their code correctly. [See our FAQ on https://www.wordfence.com for more info]Tools:View the file. Restore the original version of this file. See how the file has changed.
Select for bulk repair
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.
Modified plugin file: wp-content/plugins/analytics-counter/readme.txtFilename: wp-content/plugins/analytics-counter/readme.txt
File type: Plugin
Issue first detected: 1 min ago.
Severity: Warning
Status New
This file belongs to plugin “Google Analytics Counter Tracker” version “3.3.0” and has been modified from the file that is distributed by www.ads-software.com for this version. Please use the link to see how the file has changed. If you have modified this file yourself, you can safely ignore this warning. If you see a lot of changed files in a plugin that have been made by the author, then try uninstalling and reinstalling the plugin to force an upgrade. Doing this is a workaround for plugin authors who don’t manage their code correctly. [See our FAQ on https://www.wordfence.com for more info]Tools:View the file. Restore the original version of this file. See how the file has changed.
Select for bulk repair
Resolve:I have fixed this issue Ignore until the file changes. Always ignore this file.
- The topic ‘Help needed for hacked site’ is closed to new replies.