A General Technology & Development Blog

Technology, Development, Programming – Magento, Wordpress.

Home » Recent common places to find malicious hack scripts in WordPress

Recent common places to find malicious hack scripts in WordPress

If your WordPress website has been hacked and you find a malicious file hidden away in the depths of your domain directory, the chances are there are other malicious files in other directories.

Sometimes when you find a script and remove it you think that is the end of it, only to continue to have problems such as mail spam from your server or compromised web pages promoting hyperlinks or malware downloads. This means there are other files hidden and possibliy a backdoor script allowing easy re-access to your server.

The best thing to do is:

  • Seek help of a developer or someone experienced in this field.
  • Run a Maldat server scan on your entire root directory to find malicious scripts.
  • Check the following directories and files for some common (recently used) hacker scripts:
    • /wp-admin/css/colors/ectoplasm/javascript.php
    • /wp-content/plugins/wordpress-seo/inc/title34.php
    • /wp-includes/SimplePie/Decode/HTML/code.php
    • /wp-includes/SimplePie/HTTP/lib.php
    • /wp-includes/SimplePie/Content/test57.php
    • /wp-includes/js/swfupload/files.php
    • /wp-includes/SimplePie/article52.php
    • /wp-content/plugins/wordpress-seo/languages/view.php
    • wp-includes/Text/Diff/Engine/cache.php
    • /wp-includes/Text/inc.php
    • /wp-includes/SimplePie/HTTP/view86.php
    • Note – although these files have different names, they all contain the same malicious script code. Remove them from your server completely.
  • Was this Helpful ?
  • Yes   No

Name of author

Name: BlogOwner

Short Bio: "The master has failed more times than the beginner has even tried."

eXTReMe Tracker