Attack on WordPress sites

You can also use the https://wpcerber.com/ free version, which is quite efficient.

1 Like

We still don’t know if OP has a WordPress problem or something else. They’re apparently not willing to say what actually happened.

2 Likes

I doubt they really know. The panic of having the sites down causes people to abandon a logical process in hopes of getting things fixed quickly and trying the simplest suggestions they are given in hopes of the quick fix.

How to correctly use the Blocklist options offered by Spamhaus?

This has nothing to do with this thread, open a new one with full details on what you are trying to achieve

3 Likes

I’m out for the next 2 Days but:

Is the system leaky

Depend what the dev who worked on your platform did. A malicious Dev can add a backdoor. But it’s impossible for us to tell you anything about it. Only someone with full access to your source can (And considering the amount of time it could take, it will only be pay-full. It can take weeks/months to find a breach or a backdoor inside an application)

Still you reinstalled 6 servers in different locations (So 6 Roots/Admin Password ??!). You may try to set up a server independently of any other (and totally independent of your current cloudmin which manage the whole). If the hackers can still operate, it’s shall narrow down to only 2 possibilities. Your platform have a backdoor or your home computer (Or anything else you used to connect to your servers/Cloudmin) is infected by a spyware (Don’t neglect this possibility).

Then if you gave so much power to the Cloudmin Admin account. Maybe It could also be a ā€œman in the middleā€ attack. But 2 installations …. a MITM seems odd (especially for 500€) except if they was able to set it easily.

Still Cloudmin is irrelevant to the problem, if after a complete reinstallation of 6 servers the attackers can still perform what ever they want, according to me it’s one of the 2 previous options I mentioned.

how did this happen

How could we say, we can only try to guess. We don’t have access to anything, not even some pictures …. A picture of the mail you received asking you money can also give some clues, but it will not fix the problem

Still @ID10T Gave you some indication about where to start.

I’m not English, neither Polish, sorry if it’s not clear.

Is what system leaky? You’ve given us no information that could help determine what happened or how.

Webmin (and Cloudmin) has no currently known exploits, and it’s been a few years since we’ve had known serious exploits. I don’t know much about the WordPress ecosystem except for the plugins we use, so I can’t say anything about what security issues might currently exist there. But, you haven’t given us any information to even help determine how your attacker got in and what they did.

So, I don’t know what we’re doing in this thread. We can’t solve anything with no information.

2 Likes

Sadly the ransom ware industry just gets more sophisticated. I knew decades back security was going to be a BIG career opportunity but I stopped looking into doing if further because I simply couldn’t think like these (fill in the blank with your favorite term here). It really is a mindset. I personally just couldn’t go down that rabbit hole.

Bottom line.

  • Have backups and a good recovery plan.
  • If possible send duplicate logs to another server.
  • Get your customers taken care of.
  • When the pressure is off, do the diagnostics.

I’m analyzing logs from one machine as to the attack, but I haven’t come to a solution yet

I have a lot of rules at the main router level and on individual servers.

Login is blocked only on designated IP addresses

To your wordpress sites as the topic title suggests, which would indicate that it would be attacked by a password holder or a breach of that password, but I guess you mean the administration side of the sites, so it’s possible that a wordpress plugin has allowed an internet user to run some code as root. But to be fair your not telling us what happened, which means everyone is guessing as to how you were breached

Maybe you can share this logs and give us the list of IP which are not suspicious

Sorry I’m reading again and realised I missed it but you bought all of this (at least Sprzedaje.tv) from klbtheme.com ?

Don’t search further ! The problem probably come from here. Hire a competent dev and redo everything from scratch and it will be fine. The guy who sold you this gave you a site he can probably break over an over.

Checking deeper and we get: https://klbtheme.com/partdo/intro/ https://klbtheme.com/partdo/shop/

I don’t understand the threat you are writing about?

What I means is: you bought a Site/Template which is probably full of breach. A hacky site purposely made to be hacked.

So considering the enormous business you try to run. You would be better to hire a FullStack dev (maybe a whole team) from your country with who you can talk face to face. And redo the whole from scratch

You are throwing out some serious allegations here.

Things like this open up the forum to libel allegations and possibly legal ramifications. ā€œprobablyā€ doesn’t cut it unless you can provide further evidence.

It’s one thing the accuse them of being sloppy, quite another to accuse them of illegal activity.

I just give my opinion. Based on my extremely long experience on site like klbtheme.com who pretend to sell wonder.

I have registered on so much ā€œfreelancerā€ platform and talked with so much ā€œdevā€ from Brazil to India, from China to Argentina …

ā€œDevā€ selling premade site are extremely common especially Wordpress. There are a lot of dirty Business making dirty money on this kind of platform. I just want to make sure @biuro3 realise he probably have been victim of it. I might be wrong, but I think I’m right. I don’t know a lot of people who really made money on WordPress (There are always story on internet telling some made Millions, but in reality we are usually far from it)

Again my opinion, I really say it nicely hoping to help, no madness here :innocent: (And as said above he can also share the logs)

Y’all are going crazy off-topic here.

If OP won’t give us any information about what actually happened, it is pointless to try to make up explanations based on no data.

The first page on this website, klbtheme.com, wasn’t attacked. Nothing happened to those domains, so I don’t consider this information to be accurate.

What happened was that malware was installed and started sending spam. That’s why I’m writing about this because I’m surprised that only one page was attacked, but several, and several servers. We’re still analyzing the vulnerability that caused several servers to be attacked. I’ll get back to you when we find anything.

Did you install a security plugin, something like wordfence?