Wordpress Hacked - Need Expert Advice on this one...

18 replies
What a week this has been. And I'm supposed to be on vacation. It's a good thing I'm keeping an eye on things, as all my websites were hacked.

What I need advice on regarding the site hack is this:

From the hosting company I received this message:

Malicious files were uploaded into your account via the following script http://xxxx.com/mass.php

What is the mass.php file and is it possible to make this file secure next time around?

Also, are some hosting companies more secure than others? I know the hosting company I was using gets very bad reviews, but I took a gamble and tried them anyway.

I have copies of all my websites and it really isn't a big issue, as most of the sites were experimental sites that I was intending to take down right after my vacation. I deleted all the files on the hosting account, and have canceled the account, but I sure don't want this to happen with more serious sites in the future if I can help it. I do make Wordpress as secure as I can following some excellent instructions I have received from members of this forum, so I'm not sure what I overlooked?
#advice #expert #hacked #wordpress
  • Profile picture of the author colinph970
    Hi Val

    I see this all too often and have therefore written a simple guide to what to do to recover your site and also how to prevent it happening again. Coincidentally it has the same title as your post! You can get it at:

    In the U.S.

    Amazon.com: Wordpress Hacked Report eBook: Mandy...Amazon.com: Wordpress Hacked Report eBook: Mandy...

    In the U.K.

    Wordpress Hacked Report eBook: Mandy Hardwick:...Wordpress Hacked Report eBook: Mandy Hardwick:...

    If you don't have a Kindle then pmail me and I'll send you a pdf copy at a discount....
    {{ DiscussionBoard.errors[4373098].message }}
  • Profile picture of the author timvaquera
    either post a job in elance or go to fiverr.com to get someone to help you

    if you really need help urgently and don't mind spending some money on this you can get the security experts to help you on this.

    i think the experts charge a fee of $100 per month to help you maintain your server
    {{ DiscussionBoard.errors[4373107].message }}
    • Profile picture of the author SteveJohnson
      Originally Posted by timvaquera View Post

      either post a job in elance or go to fiverr.com to get someone to help you

      if you really need help urgently and don't mind spending some money on this you can get the security experts to help you on this.

      i think the experts charge a fee of $100 per month to help you maintain your server
      ROFLMAO!!! You'd look for a security expert on elance or fiverr??

      And you'd expect to pay $100?

      Most people who know what they're doing wouldn't even LOOK at a hacked site for $100, let alone fix it.
      Signature

      The 2nd Amendment, 1789 - The Original Homeland Security.

      Gun control means never having to say, "I missed you."

      {{ DiscussionBoard.errors[4373244].message }}
  • Profile picture of the author Jake Gray
    If you are willing to risk your business with a host that has been known for bad reviews, your thinking truly confuses me. Due to the fact you were using, be sure to only use plugins that you know have a proven track record. Using numerous plugins that don't even get used is an additional security risk. Be sure to keep everything up to date and keep back-ups of ALL your websites.
    {{ DiscussionBoard.errors[4373117].message }}
  • Profile picture of the author Istvan Horvath
    To the best of my knowledge there is NO mass.php file in a standard WP installation.
    Unless it came with a "free" theme...

    My guess would be the hackers either got access to your site(s) or they hacked the servers.

    As I was preaching all the time about WP: whoever is using the online theme editor with writable files/folders (aka chmod 666 or 777), actually, deserves to be hacked... if they leave the files writable after editing. I hope you didn't do that

    Now, if you moved away from that host we will, probably, never know whether it was their settings, a weak point on your site (like a guessable pw) or something else...

    Recently, there were a few great threads about WP security.
    Signature

    {{ DiscussionBoard.errors[4373134].message }}
  • {{ DiscussionBoard.errors[4373138].message }}
  • Profile picture of the author Brian Alaway
    Originally Posted by Val.S. View Post

    Also, are some hosting companies more secure than others?
    Stick with a reliable well known company but realize that security is ultimately your responsibility. There are many threads here about taking necessary security precautions but most users are defeated because of simple basics like weak passwords, uploading themes or plugins from third party sites and using insecure ftp for uploading. Sounds like you were taking daily backups so good for you as that's your ultimate solution for a badly hacked site.

    Originally Posted by Val.S. View Post

    I know the hosting company I was using gets very bad reviews, but I took a gamble and tried them anyway.
    And now you know better.
    {{ DiscussionBoard.errors[4373470].message }}
  • Profile picture of the author azsno
    [DELETED]
    {{ DiscussionBoard.errors[4373499].message }}
    • Profile picture of the author rcjohnson
      I used to work for an internet hosting company and would get called on a daily basis from site owners who have been hacked.

      Here is the checklist of things I would look at:

      1. Is it a CMS (Wordpress/Joomla), and are they completely upgraded?
      2. Are their plugins upgraded?
      3. Is their password stupid (you would be surprised how many people put 'password' as their root password.... kidding me)
      4. Do they have dead FTP accounts....
      5. Check the history logs and look at the last commands...
      6. Check the access logs, these have different locations based on your web interface, Plesk/Cpanel/Hosted Interface
      7. Check for weird running processes, on linux you can do a ps -aux

      There is a bunch of other things you can do to get to the real cause, but if somehow it came from mass.php then that file was probably uploaded onto your server. Their are ways to do that but primary it would be from a FTP account that was given to a programmer or web developer and never deleted after the service was completed.
      {{ DiscussionBoard.errors[4373547].message }}
    • Profile picture of the author Brian Alaway
      Originally Posted by azsno View Post

      I've created a security product that protects your valuable WordPress assets, you can see the link in my sig below....

      I'm also a former Network/Security Engineer (Checkpoint and Cisco Pix Certified), so I know a little bit about security....

      ~AzSno...
      Isn't self-promotion in this forum prohibited? I believe that's what the wso and classifieds are for.
      {{ DiscussionBoard.errors[4373552].message }}
  • Profile picture of the author azsno
    You can promote your "own" products and WSO's in your sig file, you're not allowed to promote affiliate links....

    WP-Padlock Security Suite is MY product, and I'm only pointing out my sig link to someone who obviously can use the help...

    There's another thread that has discussed my product at length right here in this thread: http://www.warriorforum.com/main-int...p-padlock.html so it's not without precedence!

    ~AzSno...
    {{ DiscussionBoard.errors[4373584].message }}
    • Profile picture of the author Brian Alaway
      Originally Posted by azsno View Post

      You can promote your "own" products and WSO's in your sig file, you're not allowed to promote affiliate links....
      ~AzSno...
      Yes, in your sig file, NOT in your post.

      Originally Posted by azsno View Post

      I've created a security product that protects your valuable WordPress assets, you can see the link in my sig below....
      {{ DiscussionBoard.errors[4373618].message }}
  • Profile picture of the author Istvan Horvath
    I'm only pointing out my sig link
    That's exactly what you shouldn't do...
    Signature

    {{ DiscussionBoard.errors[4373624].message }}
  • Profile picture of the author azsno
    Well, here's the Forum Rules:

    The main overriding rule for this forum is this:

    Rule #1

    If you have a problem with another Warrior, a Guru, or God, take it up with them directly. Not here. No exceptions.

    --------------------

    ==> NO POLITICS OR RELIGION. <==

    --------------------

    SIGNATURE FILE RULES

    Sig Files are getting out of hand.

    We're getting all colors of the rainbow and some people are using massive fonts...comes a time when things need to get back into line so...

    NEW SIG FILE RULES

    (1) Maximum length of sig file is 5 lines which includes any blank lines used for spaces.

    EDIT: War Room members are allowed up to 6 lines.

    (2) You are only permitted 1 color in your sig file, this can be any color so long as it's black (hyper links can be blue as they come up this way on the board)

    (3) Sig files may only be written in the normal standard font size.

    (4) You may bold or italicize but that's it.

    added by admin:

    (5) No Affiliate Links Allowed - Promote Your Own Domain/s Only. It's either this or we have to cut out sig files altogether which we do not want to do.

    EDIT ADDED 3 May 2011: The new WarriorPlus affiliate links for WSOs are not allowed either.

    (6) Anyone Caught Promoting The Same Site/Offer Will Be Deleted. Program owners are telling their members to come here and make posts to promote their offer in their sig files. This has caused tons of useless messages to be posted and it is clogging up the forum. Anyone caught doing this will have to be removed. This is not an ad forum - it is a discussion forum.

    Edit: We have no problem with someone pointing to their WSO within their sig.

    Edit: Due to certain people trying to find a loophole I needed to add yet another edit. Please do not try to get around these rules by getting your own domain name and simply redirecting it to an affiliate program. You Will Be Removed From Here When Caught.

    If you want to promote an affiliate program do it on your own domain. Your own web site. Not a "pre-made" web site. Your own web site, a real one. Then put THAT web site in your sig file.

    A simple way to stay within this rule is this: Promote Your Own Real Web Site And Do Not Listen To Anyone Who Tells You To Come Here Just To Promote A Site They Created For You.

    Michael Tracey
    Warrior Forum Moderator


    Can someone be so kind as to point out where I broke the rules???
    {{ DiscussionBoard.errors[4373651].message }}
  • Profile picture of the author azmanar
    Originally Posted by Val.S. View Post

    What a week this has been. And I'm supposed to be on vacation. It's a good thing I'm keeping an eye on things, as all my websites were hacked.

    What I need advice on regarding the site hack is this:

    From the hosting company I received this message:

    Malicious files were uploaded into your account via the following script http://xxxx.com/mass.php

    What is the mass.php file and is it possible to make this file secure next time around?

    Also, are some hosting companies more secure than others? I know the hosting company I was using gets very bad reviews, but I took a gamble and tried them anyway.

    I have copies of all my websites and it really isn't a big issue, as most of the sites were experimental sites that I was intending to take down right after my vacation. I deleted all the files on the hosting account, and have canceled the account, but I sure don't want this to happen with more serious sites in the future if I can help it. I do make Wordpress as secure as I can following some excellent instructions I have received from members of this forum, so I'm not sure what I overlooked?
    Hi Val,

    Try looking at this WF Blog article I've written about basic WP security and corrective measures in case of an attack.

    And I'm open to be corrected by Warriors.
    Signature
    === >>> Tomorrow Should Be Better Than Today

    {{ DiscussionBoard.errors[4373660].message }}
  • Profile picture of the author espe
    wordpress is not secure, but there is something that helps, try to search on google how to use phpbb3 MD5 encryption, they can still hack your website but they wont get any password
    {{ DiscussionBoard.errors[4373702].message }}
  • Profile picture of the author mywebwork
    I think mass.php is a program that allows the same script to be installed on several different servers and/or domains. This old link from that other forum we don't talk about has a reference to it:

    Mass PHP Script Installer for Multiple Cpanel Servers


    I'm also in full agreement that the idea of hiring some unknown "expert" on fivver or expecting to have a security specialist work their magic for only 100 dollars is ludicrous.

    As you have backups of all your sites your best bet is to get onto a reliable host and build them there, paying attention to common WordPress security methods. This is an excellent resource to get started with:

    Hardening WordPress « WordPress Codex


    Bill
    {{ DiscussionBoard.errors[4373769].message }}
  • Profile picture of the author I.M.Retired
    If you are willing to risk your business with a host that has been known for bad reviews, your thinking truly confuses me.
    I understand your confusion, Jake, but I've had several customers ask me about this hosting company, for reasons known only unto themselves. I usually recommend HostGator, BlueHost or Canadian Web Hosting to my customers, but the price was attractive to some newbies and after several questions about JH I decided to try it myself and see what all the fuss was about on the revue sites.

    I used this hosting company to set up test sites on a throw-away domain name. I had the search engines blocked, and there wasn't much original or valuable content on the sites I had posted - I mainly used the sites to test themes and other things I was was learning about.

    I discovered early on why this company has a bad reputation with numerous annoying problems before this happened. However, the cost of this experiment was only $40 (for a year's unlimited hosting) so I decided to give it a go. Nothing ventured; nothing gained. It's how I learn.

    And I have learned a lot for that $40 investment. (On all my sites, I do regular security and maintenance, keep things up-to-date, and I do regular backups.) And now I know a lot more about hacking than I did with almost 10 years experience hosting sites on other servers.

    Colin: Thanks for the offer. I will be in touch as soon as I'm officially 'off' my so-called vacation. Heading out for some serious camping and trekking this week, so will put it off until I get back.

    Istavan:
    ...whoever is using the online theme editor...
    I don't know what the online theme editor is. Is it the theme editor that is part of the Wordpress Installation? I edit all my themes via secure FTP (Transmit) and I don't leave anything editable once I am finished.

    One of the sites did have a free theme. Usually I check every file and it's contents before uploading or using a theme. I have never seen a "mass.php file in any wordpress theme, or on my server once Wordpress was installed."

    What do you mean by a 'standard' Wordpress installation? Do you mean a manual upload of Wordpress itself? Or does this mass.php file come if you do a Fantastico installation? I checked all the free themes that I was using and did not find a mass.php file in any of them, which makes me think the server was hacked.

    Which makes me curious as to why some servers are more secure than others, which is part of the reason I tried this hosting company - to find out if this was true, which I am now convinced it is.

    For what it' worth, the plugins I was using were tubepress and login lockdown. I never leave unused plugins on the server. My password looked like this - though this is not the actual password: *yg6R#2bP-/T8 My user name looked like this: yf%M.@>B7

    Also, while I think of it, I had some domains with just an index.html file in the root directory - a few sites had Wordpress, but even the html files were hacked. Not sure if that is an indication that the server was hacked, or not?

    This certainly has been a learning experience. I really feel for anyone who has had their sites hacked. Even on test sites, it wasn't a fun experience.

    Edited to add: I haven't moved away from this host - I paid until the end of December, so I'm going to rinse and repeat the process to see if I can duplicate what I did wrong. As mentioned previously, it's an experiment, so using what I've learned in this thread I'm going to try again and see what happens.
    {{ DiscussionBoard.errors[4373797].message }}
    • Profile picture of the author rcjohnson
      Interesting.....

      Check the permissions of the file mass.php if the hosting company hasn't disabled it yet... if it was/is 777 on a FILE then that is wrong... No file should be 777....

      I do have a recommendation, no affiliate link or website link since the forum has blown up into a mess: Secure Live. While at the hosting company I got to meet the creator of Secure Live, and he explained to me the total functionality of his program.

      It is VERY interesting in how it protects websites by funneling traffic through their servers and then onto your website without taking a performance hit. If there was any product that I would recommend it would be Secure Live if you wanted to be EXTREMELY careful with any of your wordpress/joomla/etc....

      They also do completely file scans, what this means is they go through the entire file contents and show you potential security holes.

      The creator of Secure Live also was on the team that created Joomla, he showed me a website that reports security issues to Joomla. That morning Joomla released a quick update to fix a security hole that was reported, 10 minutes later a user reported ANOTHER issue. This site is completely public and hackers can easily obtain ideas for hacking into these CMS sites. This goes to how you that even if you do update that it isn't 100% secure....

      The only issue I saw with Secure Live is that it takes some tweaking to make sure actual visitors aren't getting banned/blocked..... I saw several scenarios where users who didn't know the settings were accidentally blocking traffic....

      Just a thought, check it out, I do not work for that hosting company anymore but I did like the ideas and innovative thinking of Secure Live.
      {{ DiscussionBoard.errors[4373884].message }}

Trending Topics