Eric Bourland
asked on
your opinion about this .htaccess file?
Hi friends. I have a WordPress site that was compromised. Last night, someone made changes in the web site --disabling security plugins.
I am reviewing changed files. Here is the .htaccess file; what do you think of it? Does this look like nefarious code? Please give me your thoughts and wisdom, if you have time. Thank you as always.
Eric
I am reviewing changed files. Here is the .htaccess file; what do you think of it? Does this look like nefarious code? Please give me your thoughts and wisdom, if you have time. Thank you as always.
Eric
# BEGIN WordPress
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>
# END WordPress
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Of course, you still don't know how they got in and what other code has been messed with. So I wouldn't be all that reassured :)
ASKER
I know. I have inherited a big mess. I might be back. =)
Peace.
Eric
Peace.
Eric
Merry Christmas!
All kidding aside, run a free Sucuri scan on the site and see if it picks up a modified file. If you find yourself doing this semi-often consider a subscription to Sucuri where they go in and clean it for you or StopTheHacker (similar service).
All kidding aside, run a free Sucuri scan on the site and see if it picks up a modified file. If you find yourself doing this semi-often consider a subscription to Sucuri where they go in and clean it for you or StopTheHacker (similar service).
ASKER
Jason,
I hope your holidays are treating you with peace and other good things.
Good advice about Sucuri. I still have a hacked site I am trying to unhack and secure. In the process I am learning a ton about WordPress. =)
I am curious to know how Sucuri or StopTheHacker can find all affected files -- they are .js files I think, but I also think that if these nefarious .js files are removed, they regenerate themselves. It would be so helpful to know just what Sucuri et al. does to remedy that.
I will run all of this past the client and see what he wants to do. A Sucuri investigation and report might be what I need to see next.
I have another WordPress question I will post here in a little while, after scratching my head about it for a few days.
Hope you are well.
Eric
I hope your holidays are treating you with peace and other good things.
Good advice about Sucuri. I still have a hacked site I am trying to unhack and secure. In the process I am learning a ton about WordPress. =)
I am curious to know how Sucuri or StopTheHacker can find all affected files -- they are .js files I think, but I also think that if these nefarious .js files are removed, they regenerate themselves. It would be so helpful to know just what Sucuri et al. does to remedy that.
I will run all of this past the client and see what he wants to do. A Sucuri investigation and report might be what I need to see next.
I have another WordPress question I will post here in a little while, after scratching my head about it for a few days.
Hope you are well.
Eric
I am curious to know how Sucuri or StopTheHacker can find all affected files -- they are .js files I think, but I also think that if these nefarious .js files are removed, they regenerate themselves. It would be so helpful to know just what Sucuri et al. does to remedy that.
Sucuri and StopTheHacker both offer two levels of service. The basic level is the free site scans which simply sends a robot to access the page you tell them to access and analyzes the code returned by your server. So if there is malicious code present in the JS files or the rendered HTML, the robot sees it and should be able to tell you which file is currently compromised which is helpful but doesn't help you fix it.
The true value is the paid service. You usually have to give them SSH or SFTP access to your server but they will then go in and scan all WordPress files and look for files with different checksums than what is expected from normal. Since almost every file in the WordPress core (except for themes and plugins, really) don't change after installation, the checksums can be used to determine if a file has been modified. If so, you look at the file for injected code and from there identifying the malware and removing it is pretty simple. Sucuri and StopTheHacker can also change the files and server settings to remove common WordPress security holes that allow for malware to be inserted. Sucuri also offers a plugin that works as both a file change log and IP blacklister which is kind of nice. Not sure if StopTheHacker has a similar function.
If the client can afford it, a better option than Sucuri or StopTheHacker is the higher levels of service from VaultPress. VaultPress backs up your entire WordPress site, files and database both, and also provides a complete log of changes made to files and databases. If you pay for the second tier or higher of the service, they will alert you to malware infections and let you instantly roll back to a known, good state.
ASKER
Jason, thank you as always. Very useful information. I will discuss this with the client.
Hope you're great.
All best,
Eric
Hope you're great.
All best,
Eric
ASKER
Eric