wflogs/config.php hacked
-
A site I manage which is protected by WordFence was suspended by my Linux host today with the following partial explanation:
“This email is to inform you that our internal systems have identified potential malware active on your account.
The following file(s) have been affected:
###
{CAV}Atomicorp.PHP.Malware.051217140223.21012 found for /home/xxxxxxx/public_html/wp-content/wflogs/config.php
###I assume “Atomicorp” is the scanning software they’re using. Presently I can only access the site via cPanel. I’ve replaced the file in question with a fresh copy from 2 days ago and am awaiting the host to unlock the site.
I’ve also sent both versions of the file to [email protected] with a reference back to this post. You’ll see that the latest (hacked) version is significantly larger than the previous version, and contains hundreds of additional lines.
1. Assuming the site is cleared by my host, what should I do most immediately to secure the site?
2. What do you suggest to prevent future hacking of this WordFence file?
Thank you!
- The topic ‘wflogs/config.php hacked’ is closed to new replies.