New exploit? sma.php sending spam emails
-
URGENT HELP needed – new exploit?
Hi there,on Monday our webhosting ISP had notified me that spam was being sent from our WP site using a php script named sma.php. This script seems to contain a compressed and binary encoded phpmailer.
What I did:
– We were using WP 4.5.1 at that time. So I upgraded to 4.5.2 and also upgraded all plugins.
– Deleted sma.php (it was in the root of the WP site)
– changed FTP passwordsOur Plugins we use (all latest version):
– Akismet
– Contact Form Builder
– NextGen Gallery
– TinyMCE Advanced
– WOW SliderPROBLEM:
– Today I checked again via FTP and noticed that sma.php had reappeared again – it was created yesterday afternoon.HELP URGENTLY NEEDED:
What else can I do ?
(I can provide a copy of the sma.php)This is what the beginning of the sma.php looks like:
<? eval(gzuncompress(base64_decode(‘eNrtfW1727a…….This was an email header of one of the spam mails:
Received: by ourISPsmtpserver (Postfix, from userid 10028)
id 0F181E83F4; Tue, 17 May 2016 19:32:47 +0200 (CEST)
To: [email protected]
Subject: RE:Hi.. h a y today it is my photos!!!
X-PHP-Originating-Script: 10028:sma.php(1) : eval()’d code
Date: Tue, 17 May 2016 19:32:47 +0200
From: Nadezhda <[email protected]>
Message-ID: <[email protected]>
X-Priority: 3
X-Mailer: PHPMailer 5.2.2 (https://code.google.com/a/apache-extras.org/p/phpmailer/)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary=”b1_638e453905cf44cad746abc450083f17″
- The topic ‘New exploit? sma.php sending spam emails’ is closed to new replies.