Wordpress Hack on linux apache server - no detectable changes in files [duplicate]How do I deal with a compromised server?How did they hack my Wordpress sitesMy Wordpress site being hack by modifying the .htaccessWordpress crashing, Apache restart fixes it temporarilyRedirect aspx in apacheServer does not load WordPress - No HTML nor PHP ErrorsWordpress on Apache is redirecting all https to httpNginx 0.7.43 to proxypass a Wordpress site to Apache 2.4 + PHP 5.6Weird redirects on websiteHow to debug this mass site outage situation?404 routing issue - AWS Linux Wordpress site

Failing students when it might cause them economic ruin

Can the word crowd refer to just 10 people?

Latin words remembered from high school 50 years ago

Why does the U.S military use mercenaries?

Can anyone provide me info what this is?

Is it a good idea to teach algorithm courses using pseudocode instead of a real programming language?

Vehemently against code formatting

Why are Marine Le Pen's possible connections with Steve Bannon something worth investigating?

What's is the easiest way to purchase a stock and hold it

Was Tyrion always a poor strategist?

Bash Array of Word-Splitting Headaches

Does science define life as "beginning at conception"?

Why were early aviators' trousers flared at the thigh?

Was murdering a slave illegal in American slavery, and if so, what punishments were given for it?

How to plot a surface from a system of equations?

Why could the Lunar Ascent Engine be used only once?

Can a problematic AL DM/organizer prevent me from running a separate AL-legal game at the same store?

Why does snapping your fingers activate the Infinity Gauntlet?

Does the Aboleth have expertise in history and perception?

Is presenting a play showing Military charactes in a bad light a crime in the US?

Better than Rembrandt

Working hours and productivity expectations for game artists and programmers

Find the 3D region containing the origin bounded by given planes

What is the backup for a glass cockpit, if a plane loses power to the displays/controls?



Wordpress Hack on linux apache server - no detectable changes in files [duplicate]


How do I deal with a compromised server?How did they hack my Wordpress sitesMy Wordpress site being hack by modifying the .htaccessWordpress crashing, Apache restart fixes it temporarilyRedirect aspx in apacheServer does not load WordPress - No HTML nor PHP ErrorsWordpress on Apache is redirecting all https to httpNginx 0.7.43 to proxypass a Wordpress site to Apache 2.4 + PHP 5.6Weird redirects on websiteHow to debug this mass site outage situation?404 routing issue - AWS Linux Wordpress site






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0
















This question already has an answer here:



  • How do I deal with a compromised server?

    13 answers



I have a weird hacking case with one of my wordpress sites. It's a small site, basically shows 5 blog posts on whether or not the office will be open/closed. It's not too complicated or anything, but it was hacked and now redirects to some spam/malware sites.



Basically the site loads the pages, and after about 3 seconds it redirects. I've checked the header.php, index, footer, and don't see anything obvious, plus they weren't listed as being changed. The other thing that is weird is I ran a linux command to search for files that have been changed in the last 10 days, and the only ones that came back were ones I touched while checking for these redirects and doing :wq with vi. It doesn't seem like anything on the php/backend side is doing this redirect.



It is hosted on a apache linux server. Would there be somewhere else I can check to see if this redirect is being made? If there was something that was causing it in the php files, wouldn't it redirect immediately instead of letting the site load? There isn't an .htaccess and I don't see anything obivous in the apache.conf file.



After doing some digging I found that there is some script injects in all pages. The script redirects to a page where there is some malicious content. However, the wordpress version control does not say that these pages were edited. It doesn't have anything historical that looks like this had happened. Is it possible that something was changed in the wp-admin to inject these scripts in the editor? Or if you make changes to the wordpress database for a page does it not create a new version? Where would I check that? What permissions should my wordpress site have?



Thanks for the help!










share|improve this question















marked as duplicate by Iain, kubanczyk, Ward May 8 at 2:59


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.


















  • @lain it is similar, but I think the core question here is not how to deal with the compromise but rather how the observed malware could function in this context. Brendan, I would recommend editing the question, however, to clarify the main question now that you have found the malware.

    – Kernel Stearns
    May 7 at 12:58

















0
















This question already has an answer here:



  • How do I deal with a compromised server?

    13 answers



I have a weird hacking case with one of my wordpress sites. It's a small site, basically shows 5 blog posts on whether or not the office will be open/closed. It's not too complicated or anything, but it was hacked and now redirects to some spam/malware sites.



Basically the site loads the pages, and after about 3 seconds it redirects. I've checked the header.php, index, footer, and don't see anything obvious, plus they weren't listed as being changed. The other thing that is weird is I ran a linux command to search for files that have been changed in the last 10 days, and the only ones that came back were ones I touched while checking for these redirects and doing :wq with vi. It doesn't seem like anything on the php/backend side is doing this redirect.



It is hosted on a apache linux server. Would there be somewhere else I can check to see if this redirect is being made? If there was something that was causing it in the php files, wouldn't it redirect immediately instead of letting the site load? There isn't an .htaccess and I don't see anything obivous in the apache.conf file.



After doing some digging I found that there is some script injects in all pages. The script redirects to a page where there is some malicious content. However, the wordpress version control does not say that these pages were edited. It doesn't have anything historical that looks like this had happened. Is it possible that something was changed in the wp-admin to inject these scripts in the editor? Or if you make changes to the wordpress database for a page does it not create a new version? Where would I check that? What permissions should my wordpress site have?



Thanks for the help!










share|improve this question















marked as duplicate by Iain, kubanczyk, Ward May 8 at 2:59


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.


















  • @lain it is similar, but I think the core question here is not how to deal with the compromise but rather how the observed malware could function in this context. Brendan, I would recommend editing the question, however, to clarify the main question now that you have found the malware.

    – Kernel Stearns
    May 7 at 12:58













0












0








0









This question already has an answer here:



  • How do I deal with a compromised server?

    13 answers



I have a weird hacking case with one of my wordpress sites. It's a small site, basically shows 5 blog posts on whether or not the office will be open/closed. It's not too complicated or anything, but it was hacked and now redirects to some spam/malware sites.



Basically the site loads the pages, and after about 3 seconds it redirects. I've checked the header.php, index, footer, and don't see anything obvious, plus they weren't listed as being changed. The other thing that is weird is I ran a linux command to search for files that have been changed in the last 10 days, and the only ones that came back were ones I touched while checking for these redirects and doing :wq with vi. It doesn't seem like anything on the php/backend side is doing this redirect.



It is hosted on a apache linux server. Would there be somewhere else I can check to see if this redirect is being made? If there was something that was causing it in the php files, wouldn't it redirect immediately instead of letting the site load? There isn't an .htaccess and I don't see anything obivous in the apache.conf file.



After doing some digging I found that there is some script injects in all pages. The script redirects to a page where there is some malicious content. However, the wordpress version control does not say that these pages were edited. It doesn't have anything historical that looks like this had happened. Is it possible that something was changed in the wp-admin to inject these scripts in the editor? Or if you make changes to the wordpress database for a page does it not create a new version? Where would I check that? What permissions should my wordpress site have?



Thanks for the help!










share|improve this question

















This question already has an answer here:



  • How do I deal with a compromised server?

    13 answers



I have a weird hacking case with one of my wordpress sites. It's a small site, basically shows 5 blog posts on whether or not the office will be open/closed. It's not too complicated or anything, but it was hacked and now redirects to some spam/malware sites.



Basically the site loads the pages, and after about 3 seconds it redirects. I've checked the header.php, index, footer, and don't see anything obvious, plus they weren't listed as being changed. The other thing that is weird is I ran a linux command to search for files that have been changed in the last 10 days, and the only ones that came back were ones I touched while checking for these redirects and doing :wq with vi. It doesn't seem like anything on the php/backend side is doing this redirect.



It is hosted on a apache linux server. Would there be somewhere else I can check to see if this redirect is being made? If there was something that was causing it in the php files, wouldn't it redirect immediately instead of letting the site load? There isn't an .htaccess and I don't see anything obivous in the apache.conf file.



After doing some digging I found that there is some script injects in all pages. The script redirects to a page where there is some malicious content. However, the wordpress version control does not say that these pages were edited. It doesn't have anything historical that looks like this had happened. Is it possible that something was changed in the wp-admin to inject these scripts in the editor? Or if you make changes to the wordpress database for a page does it not create a new version? Where would I check that? What permissions should my wordpress site have?



Thanks for the help!





This question already has an answer here:



  • How do I deal with a compromised server?

    13 answers







apache-2.4 redirect wordpress spam






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited May 7 at 17:01







Brendan

















asked May 7 at 2:04









BrendanBrendan

32




32




marked as duplicate by Iain, kubanczyk, Ward May 8 at 2:59


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.









marked as duplicate by Iain, kubanczyk, Ward May 8 at 2:59


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.














  • @lain it is similar, but I think the core question here is not how to deal with the compromise but rather how the observed malware could function in this context. Brendan, I would recommend editing the question, however, to clarify the main question now that you have found the malware.

    – Kernel Stearns
    May 7 at 12:58

















  • @lain it is similar, but I think the core question here is not how to deal with the compromise but rather how the observed malware could function in this context. Brendan, I would recommend editing the question, however, to clarify the main question now that you have found the malware.

    – Kernel Stearns
    May 7 at 12:58
















@lain it is similar, but I think the core question here is not how to deal with the compromise but rather how the observed malware could function in this context. Brendan, I would recommend editing the question, however, to clarify the main question now that you have found the malware.

– Kernel Stearns
May 7 at 12:58





@lain it is similar, but I think the core question here is not how to deal with the compromise but rather how the observed malware could function in this context. Brendan, I would recommend editing the question, however, to clarify the main question now that you have found the malware.

– Kernel Stearns
May 7 at 12:58










1 Answer
1






active

oldest

votes


















0














If your server was compromised, then it is entirely possible for the attacker to circumvent any application-level version controls through the back end, including the built-in Wordpress page versions and timestamps. It is also possible to falsify the date modified on files, as noted here: https://askubuntu.com/questions/62492/how-can-i-change-the-date-modified-created-of-a-file.



There are any number of different specific ways that malware could be created to implant redirection scripts on every page like this, so without analyzing the specific malware there is no way to tell exactly how it was built. Some simple JavaScript would be fully capable of detecting whether you were logged in through the dashboard or not, and only running the redirect code on the public site.



I would recommend referring to these steps for responding to a compromised server: How do I deal with a compromised server?






share|improve this answer





























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0














    If your server was compromised, then it is entirely possible for the attacker to circumvent any application-level version controls through the back end, including the built-in Wordpress page versions and timestamps. It is also possible to falsify the date modified on files, as noted here: https://askubuntu.com/questions/62492/how-can-i-change-the-date-modified-created-of-a-file.



    There are any number of different specific ways that malware could be created to implant redirection scripts on every page like this, so without analyzing the specific malware there is no way to tell exactly how it was built. Some simple JavaScript would be fully capable of detecting whether you were logged in through the dashboard or not, and only running the redirect code on the public site.



    I would recommend referring to these steps for responding to a compromised server: How do I deal with a compromised server?






    share|improve this answer



























      0














      If your server was compromised, then it is entirely possible for the attacker to circumvent any application-level version controls through the back end, including the built-in Wordpress page versions and timestamps. It is also possible to falsify the date modified on files, as noted here: https://askubuntu.com/questions/62492/how-can-i-change-the-date-modified-created-of-a-file.



      There are any number of different specific ways that malware could be created to implant redirection scripts on every page like this, so without analyzing the specific malware there is no way to tell exactly how it was built. Some simple JavaScript would be fully capable of detecting whether you were logged in through the dashboard or not, and only running the redirect code on the public site.



      I would recommend referring to these steps for responding to a compromised server: How do I deal with a compromised server?






      share|improve this answer

























        0












        0








        0







        If your server was compromised, then it is entirely possible for the attacker to circumvent any application-level version controls through the back end, including the built-in Wordpress page versions and timestamps. It is also possible to falsify the date modified on files, as noted here: https://askubuntu.com/questions/62492/how-can-i-change-the-date-modified-created-of-a-file.



        There are any number of different specific ways that malware could be created to implant redirection scripts on every page like this, so without analyzing the specific malware there is no way to tell exactly how it was built. Some simple JavaScript would be fully capable of detecting whether you were logged in through the dashboard or not, and only running the redirect code on the public site.



        I would recommend referring to these steps for responding to a compromised server: How do I deal with a compromised server?






        share|improve this answer













        If your server was compromised, then it is entirely possible for the attacker to circumvent any application-level version controls through the back end, including the built-in Wordpress page versions and timestamps. It is also possible to falsify the date modified on files, as noted here: https://askubuntu.com/questions/62492/how-can-i-change-the-date-modified-created-of-a-file.



        There are any number of different specific ways that malware could be created to implant redirection scripts on every page like this, so without analyzing the specific malware there is no way to tell exactly how it was built. Some simple JavaScript would be fully capable of detecting whether you were logged in through the dashboard or not, and only running the redirect code on the public site.



        I would recommend referring to these steps for responding to a compromised server: How do I deal with a compromised server?







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered May 7 at 2:53









        Kernel StearnsKernel Stearns

        604316




        604316













            Popular posts from this blog

            Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

            Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

            Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020