Little info, I’ve been outsourced as a consultant to fix a clients web site.
I have the same issue that has just recently occured in this thread. I was called in to take a look at a clients site that hadn’t been managed at all with upgrades/security patches and a negligant MLSP that doesn’t bother to take backups….not sure how much they pay for insurance in the event of a fire or natural disaster.There should have really been someone in the orgnisation making sure it was continually patched but we’re past that now. Not worth thinkging about.
I guess the options are right now to try and clean up the site. Althought the host is giving me a hard time getting into the MySQL DB to look through the tables.
Has anyone got a list of files that extentiate the exploit? It was running 1.6.4 from memory which is a LONG way off the current platform 2.5.x. It would be good to stay with EE but i need to swap hosting services first of all because the current guys are hopeless, 24/7 support that starts at 8am. Trying to work back of the clock to resolve this issue. It’s a real pain. I assume the v2 CMS has a lot of these php holes closed?
/root/PHP5.php contained a list of drug names (has been renamed *.bak)
htdocs/companyfolder/templates/options.php (renamed to a *.bak)
htdocs/themes/site_themes/scache.php (has been removed by another colleague)
htdocs/Copy_of_help/doc/classes.php (renamed as it pulled malware)
All of these files timestamped with 2008-2009.
I guess the exploit gave acces to the MySQL DB that allowed them to add tables and content. Any pointers at this stage would be ideal. No backups of the DB or the front end or i’d have restore by now.
I’ve removed what I can and used google webmaster tools to re-index the site. I’m not confident i’ve removed the malware as it looks encrypted.
At the end of the day, we need to step up up our online presence. So EE might not be the platform of choice but if someone can liase with me re: why I should stay we EE we could consider it.
Kind Regards,
Chris