Hi there,
It appears that the WordPress.com account password you were using was compromised. To be clear, there has been no security breach for user accounts at WordPress.com or Jetpack. Your WordPress.com account password was compromised due to the same password being used on other services that had a data breach, or the password was weak, insecure, or easily guessed.
The plugin file you’ve seen repeatedly uploaded in the Activity Log was done by someone who accessed your WordPress.com account using the compromised password. They used that compromised password to set up an authorized connection using WordPress for Android. With this WordPress for Android connection, they were able to access your WordPress.com account. The attacker then used this access to install a plugin containing malware on your Jetpack connected site.
You should be able to delete the plugin folder from your site via FTP. The plugin can be found by going to wp-content/plugins
. If you’re unsure how to do this, please contact your hosting provider for assistance.
In order to prevent this from happening again, I recommend you to do the following:
- Use Two-Factor Authentication: Set up two-factor authentication using an app like Duo or Google Authenticator. This document goes over how to do just that. SMS two-factor authentication is an option, but isn’t as secure as using an app.
- Check Your Other Passwords: If you use the same email address/password combination on other sites or services, they could also be at risk. We recommend changing your password with these other services as well. You can find more details here on how to set strong, unique passwords.
If you use the same email address/password combination on other sites, I would also recommend changing it anywhere it’s used. These practices don’t apply to just WordPress.com sites, they are applicable anywhere you store information on the web. Let us know how this goes and if you have any additional questions.