Forum Replies Created
-
AuthorPosts
-
December 15, 2023 at 1:44 pm in reply to: I need help, I can make a donation, I have a virus on my website, I already scan #115171
Simple solution here: Those “Potential Threats” are just part of the preliminary scan which looks for the use of commonly abused functions. To scan for any “Known Threats” and access the Automatic Fix option all you need to do is to register your key and download the latest definition updates, then the Complete Scan will enable you to fix the Known Threats that are fond in any future scans with one click
Your hosting support did not understand or explain the problem correctly, but I can help make it clear and present a workaround for you to use to get rid of that error without disabling the Brute-Force Protection.
First, just to clarify, the first part of that if statement on linw 1 or your wp-config.php file is not limit the protection to one IP but rather to exclude the given IP from the Brute-Force Protect (effectively whitelisting your originally detected admin IP address).
if (!in_array($_SERVER["REMOTE_ADDR"], array(“*********”)) && file_exists(…
The problem is that your cronjob executes the PHP process without setting the $_SERVER environment variable indexed as “REMOTE_ADDR”. This causes the PHP Warning message you are seeing.
The simplest solution is to just remove that first condition from the if statement, leaving the file_exists condition intact. This would result in the first line of your wp-config.php file starting like this:
if (file_exists(…
Please let me know if you need any further assistance with this.
I’m not sure what problem you are reporting. Do you mean that the plugin is showing files as infected that are really not infected, or that the plugin is completely missing files that are actually infected?
Please send me attachments of the pertinent files so that I can better access what the problem is and how I can fix this for you.
Just following up to let you know that this last one has been added too. Please download the latest definition updates and run the complete scan again to see if any more of these are found.
Thanks for sending me your login. It looks like all your past scans were only looking in the wp-content folder, so I set the scan option to include the whole www directory which includes every folder on your site and the scanner then found the remaining 3 threat.
The redirect appears to be gone for now but I would suggests that you scan every day for the next week or so, just to make sure it does not come back. It only takes 6 minutes to scan your entire site so I would leave the scanner settings on the www directory from now on.
Please let me know if you have any more trouble. I would be glad to look at it again if there is something I missed.
I think what’s going on is that my Anti-Malware is removing some of the code from your theme that is not malicious when it takes out the really bad code, and that is causing an error in your theme since some of the code it needs is now gone.
I have just updated my malware definition database so that it will not remove good code needed by this theme and only remove the malicious code that was injected into your theme files.
Please download the latest definition updates and let me know if that works for you.
Thank you for reporting this to me. I am working on a resolution now…
Would it be possible for you to send me the error_log file from your server so that I exactly what is causing the error?
I am guessing that it is a syntax error in one of your theme files, but it would help me to see which one has the issue and what line the error is on.
Yes, I can help you find a resolution to this problem you are having.
Are all on these sites running the same version of PHP, what version is running on the site that does not start a session?
Can you try to start a session outside of WordPress?
Maybe you can create a new test.php file in the root of this site and add these few lines of code:
<?php
if (!session_id())
@session_start();
if (!isset($_SESSION["date"]))
$_SESSION["date"] = date("Y-m-d H:i:s");
echo "session started ".$_SESSION["date"];
You can also check the error_log file on your server just after you get the “Error Your Server could not start a Session!” message from my plugin, to see if there are any error details in the log that will tell us why your server cannot start a session on this site even if it can on the other sites.
Let me know how that goes and I can help you further after seeing the results of these tests.
Did my plugin identify and clean that file when you ran the Complete Scan?
If not then please email that file to me directly so that I can add it to my definition updates.
There is a recovery option on the results page that uses the backup in your Anti-Malware Quarantine, but your site appears to be block by some additional security measures that require htaccess authentication. Can you please contact me directly by replying to this email notification so that I can help you recover the damaged file?
Both of these files are actually part of the WP Core installation. I’m not sure why they won’t scan but those are both rather large files so perhaps there is just not enough memory allocated to your PHP processes on your server to read and scan those files. You can try increasing the memory_limit value in the php.ini file on your server.
I wouldn’t trust a plugin to log this kind of activity. You need to view the raw access_log files on the server. You may need to ask your hosting provider where to find those files if you cannot find them in your hosting control panel.
So this Core File is being repeatedly modified by some unknown hack, and after it is modified there is a syntax error that crashes your site until you manually fix it, is that right?
First and foremost when tracking down the source of an intrusion is to gather all the evidence you can before fixing anything that was tampered with. You need to stat the file the was hacked before you fix it so that you can tell exactly what time the hacker modified/changed that file (make sure to get both, the modified time, and the changed time). Once you have fixed this hacked file you have effectively wiped out any trace of the original modifications by the hacker. It’s like washing and putting away a knife at the scene of a crime, sure the kitchen is cleaner now but you can’t get any fingerprints or DNA samples from the weapon.
If you use the Automatic Fix feature in my plugin then a backup of the infected script is stored in the Anti-Malware Quarantine with the original infection timestamps preserved for future review. If you modify or delete these infected files manually then that info is lost.
Once you know the exact time of the infection then you can search your raw access_log files for any activity on your sites at the exact time of that latest infection. This may lead you to other malicious scripts (possibly even on another site on your server if you are on a shared hosting plan). Those newly discovered files will also need to be handled with the same care to get the stat info from them and look up those times in the logs, etc., etc.
If you come across any new malicious files that are not being identified as a Known Threat by my plugin then please email those files to me before you fix them so that I can add them to my definition updates. reading and understanding the malicious code inside those files can also help track down the source of the infection.
The error_log are stored in different places depending on the hosting configuration. You will need to ask you hosting provider where those logs can be found. However, it may be a moot point as I have just release a new plugin update that should fix that error no matter where is was coming from.
As for the blue/blue folders, the wp-admin/css/colors/blue folder itself should be there and it should have CSS files in it, but there should not be another blue folder inside that wp-admin/css/colors/blue/ directory. The second lever blue folder is probably only a symlink to the first one, so that second one is all that should be deleted.
I have just released a new plugin update (version 4.21.95) that should solve this issue for you. Please try the new update and let me know if you still have any issues.
-
AuthorPosts