It is possible that an infected computer would infect the post content or that a Key Logger on the client’s machine gave the user’s login to a hacker so that they could infect the content. But it could also just be a coincidence and the hack could have come in from a backdoor or another vulnerability.
Viewing 2 posts - 1 through 2 (of 2 total)
You must be logged in to reply to this topic.
Comments are closed.
Get instant updates to new definitions files as new threats are discovered.
*All fields are required and I will NOT share your information with anyone.
Wow, I was overwhelmed and I happened on your plugin. I had found some but I don't know php and some of the php code seemed odd to me. Sure enough, you flagged it!! Stats from my site: 5202 Scanned Files 1074 Scanned Folders Found 4 Backdoor Scripts Found 22 Known Threats