Use OptimizePress? PLEASE read....

7 replies
This is a heads up to anyone that is using OptimizePress who hasn't upgraded to the latest version (1.44).....

Do it!

I just had one of my hosting accounts hacked and I'm 97% confident it was due to the verson of timthump.php that came with this theme. The timthumb.php file initially had security vulnerabilities which left my site (and many others!) open to attacks - a quick search and you can read about it.

Since this was discovered a new version of timthumb has been released and OP was updated. If you don't want to upgrade your version, then you can find a new version of just the timthumb file that you can overwrite the old one with...it takes two minutes - do it!

Now I should point out - it's not just OP that used this file! Other plugins and themes made use of it so you should run a quick search.

If you're using a hosting account that runs on cpanel, use the "file manager" and run a search for "timthumb" in the upper right corner where it says search all files. If it's there then you'll want to make sure you're using the latest version of the file.

I've never had my sites hacked before, and I'll tell you - I never want to go through it again! It wasted a lot of my time getting things back to "normal".

And I can't really be 100% certain that I've "fixed" it - it looks ok and I with the help of my host we've been able to find the files that were added or altered, but I'm still nervous.

So take the few minutes to check into this. I used to have the "it won't happen to me" mentality and now I feel like a moron. A big one!

Lastly, I want to point out I'm not blaming OP - it's a dynamite theme and they have updated it accordingly. However I'm sure many warriors who use this theme are using an older version that still carries the older timthumb file.
#optimizepress #read
  • Profile picture of the author julesw
    Same happened to me this week with tim thumb and OP (OP not to blame), probably lost a few sales as I was away offline. People got a warning message when they arrived.

    It's all fixed now via my outsourcer.
    Signature
    WIN my Lanparte Smartphone or GoPro Gimbal! Get Ready Get Steady! Watch my Video Here:
    VideoHero.com/win
    {{ DiscussionBoard.errors[4576151].message }}
  • Profile picture of the author Brad Gosse
    Yep my main blogs were running woothemes and had a similar issue. Malware warnings etc. Terrible.

    Lesson to us all
    Signature
    {{ DiscussionBoard.errors[4576207].message }}
  • Profile picture of the author Chris Paterson
    It's not fun is it!

    Out of curiosity, was there any steps in particular that you took to hunt down any malicious files that could have been deployed? In my case I had .php files added and other files of mine were altered. I along with one of my team members went through to look through the files from that hosting account, but I'm still nervous we missed something.

    It was a big shock to visit my site only to see a message that I was hacked!
    {{ DiscussionBoard.errors[4576267].message }}
    • Profile picture of the author sanhern
      Guess I should have updated my OP sites!! Was hacked and suspended by my web hosting company...no fun to try and convince them that I was hacked!! Fixed now and changing hosting company also.
      {{ DiscussionBoard.errors[5564773].message }}
      • Profile picture of the author MarketingChad
        Originally Posted by sanhern View Post

        Guess I should have updated my OP sites!! Was hacked and suspended by my web hosting company...no fun to try and convince them that I was hacked!! Fixed now and changing hosting company also.
        I had a similar situation about 2 weeks ago. I wasn't running OP but I think it was an older version of Joomla that caused the problem. Funny thing was how the situation went down.

        It was actually a client's site that got "hacked" and they put up a whole new homepage. Immediately I reacted, got everything restored using the automatic backup, changed all the passwords, altered permissions, did everything I could to get everything back in working order.

        Then I called my hosting company to ask for solutions, logs, etc. Needless to say, the rep I talked to was pretty clueless and sent me generic Wordpress and cPanel security pages that didn't really help me at all. They said everything would be fine.

        2 days later, they suspended my account without warning. Luckily I was able to react pretty quickly and clean out the malicious files and get my sites back up within 2 hours but man what a headache.

        Needless to say, you do really get what you pay for with these "cheaper" hosting companies. I also feel they should include some sort of malware scanner/detection within cPanel so you can actually address the problem without waiting for them to suspend your account. I know there are a few alternative options but nothing that's very user friendly.

        I'm investigating some better hosting now, at least for my client sites so I am not the one getting the bad image when a site goes down. Hope everything works out for you.
        {{ DiscussionBoard.errors[5564834].message }}
        • Profile picture of the author ItsChrissy
          I have had a few of my sites hacked in the past and it's really not a nice situation. I also believe it was because I was using an outdated version of OP.

          Thankfully my then hosting company were able to restore for me, but I got so fed up of it happening even when not using OP, I decided to change hosting companies.

          I'm now with Hostgator and I've even had a couple of emails from them saying they detected malware on one of my sites and have cleaned it up and changed the passwords. In other words, they took action before I even knew there was a problem which I was super impressed with.

          The old hosting company just gave me an extra long list of things to try and avoid it happening in the future.
          {{ DiscussionBoard.errors[5565339].message }}
  • Profile picture of the author Chris Thompson
    Chris - you should use your FTP program to look at the date files were last modified. Those are your infected files (the ones modified on the date of attack).

    Here's a helpful tutorial
    http://blog.outsourcefactor.com/here...mission-thief/
    {{ DiscussionBoard.errors[5565700].message }}

Trending Topics