Although the screen that shows the db connection details only displays the value of the database password field as asterisks, the source of the page does list the password in plain text.
If the attacker used the connection details to access the database remotely they could have changed anything in the database.
]]>That’s why, if I got your remark correctly, it’s worth questioning just about possible “searching and replacing” via the searchreplacedb2.php script. I wouldn’t throw away an entire installation just because I suspect something evil might still hide in the database, should I?
I assume such an attack is not an act of vandalism, i.e. with the aim of destroying or spoil the contents – with evident outstanding effects – but instead aims to achieve some profit – redirecting to some other page was what I saw – without being noticed for the longest time possible.
There’s no use to specify I’m not a security expert – if I was I wouldn’t confess such a mistake like the one I made – but I assumed a deeper knowledge of WP tables and their roles would help in “guessing” what kind of substitutions would be useful for an attacker in tables other than “posts”. That’s the real target of my request for help.
It’s worth specifying the website is now apparently in good order, though of course to feel completely safe I have to go further with investigations: how? ??
Thanks in advance!
]]>