header.php vulnerability

Home Forums Support Forum header.php vulnerability

This topic contains 1 reply, has 2 voices, and was last updated by  Anti-Malware Admin 10 years, 10 months ago.

Viewing 2 posts - 1 through 2 (of 2 total)
  • Author
    Posts
  • #751

    Hello,

    I have been using your excellent plugin for a few days now but every morning I am greeted by a malware warning from my laptops anti virus.

    The scan show that the header.php file has been injected with code. Your plugin removes this but I am worried there is an ongoing problem.

    I have changed the permissions of the file to 444 hoping this will stop it being written to.

    Can you advise of any more measures I can take to protect my site please?

     

    Thanks

    Dan

    #752

    Anti-Malware Admin
    Key Master

    That great. Changing the permissions may work but sometimes the hackers scripts can change them back and then write to the file anyway.

    Better protection is always good and it is best to understand how the hacker is gaining access to know what protection you need to improve on. In most cases it is either a vulnerability of the host or the software you have put on the site. If there are no back-doors or vulnerabilities in the software you are running on your site (WordPress, Plugins, Themes, etc.) then it could be the host or another site on the host that is letting your site get reinfected. The only thing I can suggest is to switch to another (more secure) host.

    I am currently working on a very secure hosting environment for just such a need. The server is up and I am hosting site on it now but I have not opened it up to the public yet. It will be about $12.75 per site per month, probably more than you are paying now but more secure too ;-)

    If you are interested in hosting on my new server just send me an email and I can help you make the switch.

    Otherwise, best of luck to you and Aloha,
    Eli

Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic.

Comments are closed.