wordpress sites compromised

Customer support forums for Atomic Protector (formerly Atomic Secured Linux). There is no such thing as a bad question here as long as it pertains to using Atomic Protector. Newbies feel free to get help getting started or asking questions that may be obvious. Regular users are asked to be gentle. :-)
imadsani
Forum Regular
Forum Regular
Posts: 112
Joined: Mon Sep 16, 2013 10:10 am
Location: Lahore

wordpress sites compromised

Unread post by imadsani »

I've recently had a number of wordpress sites on my server compromised. I am pretty sure the sites weren't running the latest version of wordpress though. All of them seemed to have one thing in common, various integral files at encrypted code injected at the top of them. While ASL blocked the infected files from executing, because of the nature of the infected files, they also stopped the websites from working.

How can I prevent malicious code injection?

I've scanned a couple of properties and see malicious files uploaded pretty recently as well
User avatar
hostingg
Forum User
Forum User
Posts: 63
Joined: Mon Mar 18, 2013 6:26 pm
Location: Earth

Re: wordpress sites compromised

Unread post by hostingg »

if the files have been changed that means they edited the files. when this has happened to us its because they guessed a password and logged in to the shell.
If everything was easy, then the world wouldn't need engineers.
Post Reply