Trying to identify how a hacker got in to my site
-
I was recently hacked. It happened while I was on holiday so I didn’t notice but the compromise was picked up by my service provider who immediately took the site offline. Fortunately it is just a test site so the need to get in back working is not urgent and I can afford some time to try and figure out how the hacker got in before rolling back to a previous uncompromised (I hope) version of the site.
I had Wordfence installed on the site and, on 20 July, I received an email from Wordfence alerting me to the fact that someone with username ‘jakonda’ had logged in to the site with admin privileges. No such user should exist on the site but, alas, as I was on holiday, I didn’t notice the email nor did I notice the fact that, from that point on, the usually regular emails from Wordfence stopped. My bad ??
Now I’m back and my service provider has permitted (just) me to access the site to clean things up. When I logged in found that the hacker had deleted Wordfence, so there are no logs after the 20 July but, by re-installing Wordfence, I was able to pick up the live traffic logs back to 8th July. There, in addition to recording the login by ‘jakonda’ at 10:22 on July 20, there are a number of apparently harmless page access attempts from the same IP address from 9am onwards but there is one strange record in the log that rings alarm bells:
Activity Detail Voronezh, Russia visited https://hogroasterhire.com/wp-content/themes/924/add_admin.php 7/20/2019 9:53:36 AM (16 days 6 hours ago) IP: 109.106.140.170 Hostname: 109.106.140.170 Browser: Chrome version 0.0 running on Win7 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36 OPR/62.0.3331.72
Does this ring any bells for anyone out there? Could this have been the step that enabled him to create the rogue ‘jakonda’ user? And most worryingly, how?
The URL listed in the record above doesn’t exist but the site
hogroasterhire.com
does. A scan by Sucuri doesn’t detect any malware on the site but it does warn that the Apache software is outdated (under 2.4.39).Any advice on where I should/could go from here to identify how the hacker got in would be much appreciated. I have to admit there were a number of plugins awaiting update so perhaps there is potential there, but none of the plugin updates were identified as ‘critical by Wordfence.
The page I need help with: [log in to see the link]
- The topic ‘Trying to identify how a hacker got in to my site’ is closed to new replies.