• Someone is using the plugins popcash.net and google adsense to upload malicious code to my site and add files/ads to it. This has been going on nearly daily for a week, but these types of attacks even longer. An admin will somehow be created on my site named ‘backup’ and my site will be covered in spam. How is this happening and how can I stop it?

    The page I need help with: [log in to see the link]

Viewing 2 replies - 1 through 2 (of 2 total)
  • Moderator Steven Stern (sterndata)

    (@sterndata)

    Volunteer Forum Moderator

    Get a fresh cup of coffee, take a deep breath and carefully follow this guide. When you’re done, you may want to implement some (if not all) of the recommended security measures.

    If you’re unable to clean your site(s) successfully, there are reputable organizations that can clean your sites for you. Sucuri and Wordfence are a couple.

    A quick look at popcash and it appears to be quite insecure (css issues). FTP into your website and manually delete the plugins that you believe are the cause and any extra files that should not be there. In fact you can just reupload the entire wordpress fileset overwriting the files on your site to sort out any issues where wordpress files have had extra malicious code added to them.

    Once your site has been exploited in such a manner, attackers regularly return via automated exploitation mechanisms. So in your case you should look at my plugin Pareto Security. It will prevent re-exploitation.

Viewing 2 replies - 1 through 2 (of 2 total)
  • The topic ‘Site being attaked’ is closed to new replies.