Malicious .giff files but can’t delete without website errors
-
have a wordpress scan warning for malicious .giff files, the files don’t open as images so i also believe they’re likely malicious as well.
But when I delete the files, via ftp, i have the following warning on the site.
logos.gif): failed to open stream: No such file or directory in /homepages/37/d634318852/htdocs/clickandbuilds/printhousegroup/wp-content/themes/inkthemetrust/functions.php on line 10
Warning: include(): Failed opening ‘images/logos.gif’ for inclusion (include_path=’.:/usr/lib/php5.6′) in /homepages/37/d634318852/htdocs/clickandbuilds/printhousegroup/wp-content/themes/inkthemetrust/functions.php on line 10
Warning: Cannot modify header information – headers already sent by (output started at /homepages/37/d634318852/htdocs/clickandbuilds/printhousegroup/wp-content/themes/inkthemetrust/functions.php:10) in /homepages/37/d634318852/htdocs/clickandbuilds/printhousegroup/wp-admin/includes/misc.php on line 1114
I have to put the .giff back to remove the error. WordPress scan results are:
File appears to be malicious: wp-content/themes/inkthemetrust/images/logos2.gif
Filename: wp-content/themes/inkthemetrust/images/logos2.gif
File Type: Not a core, theme or plugin file.
Issue First Detected: 8 mins ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “a:7:{s:18:”__sape_delimiter__”;”. The infection type is: Misc:TXT/links. This file was detected because you have enabled “Scan images, binary, and other files as if they were executable”, which treats non-PHP files as if they were PHP code. This option is more aggressive than the usual scans, and may cause false positives.File appears to be malicious: wp-content/themes/inkthemetrust/images/logos.gif
Filename: wp-content/themes/inkthemetrust/images/logos.gif
File Type: Not a core, theme or plugin file.
Issue First Detected: 8 mins ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “var $_server_list = array(‘dispenser-01.sape.ru'”. The infection type is: Spammer:PHP/SAPE. This file was detected because you have enabled “Scan images, binary, and other files as if they were executable”, which treats non-PHP files as if they were PHP code. This option is more aggressive than the usual scans, and may cause false positives.I use the paid version of the WordPress
As I’m out of my depth with this issue your advice is most welcomeThanks
The page I need help with: [log in to see the link]
- The topic ‘Malicious .giff files but can’t delete without website errors’ is closed to new replies.