<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetCrafted</title>
	<atom:link href="https://netcrafted.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://netcrafted.com</link>
	<description>Crafting Internet Solutions</description>
	<lastBuildDate>Mon, 15 May 2017 13:07:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>6 Steps to Check WordPress for Malware</title>
		<link>https://netcrafted.com/articles/wordpress-malware-check/</link>
		
		<dc:creator><![CDATA[Scott]]></dc:creator>
		<pubDate>Fri, 12 May 2017 14:19:37 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[guide]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://netcrafted.com/?p=1056</guid>

					<description><![CDATA[<p>With over a quarter of all Internet sites running on WordPress, it&#8217;s a common target for malware scripts and hackers. Mix in thousands of open source plugins and themes (some coded better than others), poor shared hosting practices and weak password management, and you have the perfect recipe for an insecure site. Here are six&#8230;</p>
<p>The post <a rel="nofollow" href="https://netcrafted.com/articles/wordpress-malware-check/">6 Steps to Check WordPress for Malware</a> appeared first on <a rel="nofollow" href="https://netcrafted.com">NetCrafted</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With over a quarter of all Internet sites running on WordPress, it&#8217;s a common target for malware scripts and hackers. Mix in thousands of open source plugins and themes (some coded better than others), poor shared hosting practices and weak password management, and you have the perfect recipe for an insecure site.</p>
<p>Here are six steps to check your WordPress site for a malware infection. These are ordered from easiest to hardest.</p>
<p>&nbsp;</p>
<p><strong>1) Online Malware Scanner</strong>. For a free, quick and easy check, you can&#8217;t beat <a href="https://sitecheck.sucuri.net" target="_blank" rel="noopener noreferrer">Sucuri&#8217;s Malware and Security Scanner</a>. Just enter the URL of your site and you&#8217;ll get an online report of your site&#8217;s status along with a blacklist report. There&#8217;s a little upsell of their <em>Website Firewall</em> product (the &#8220;Medium Risk&#8221; you&#8217;ll see) but otherwise this is a great tool for a quick check.</p>
<p>&nbsp;</p>
<p><center><img decoding="async" src="https://netcrafted.com/wp-content/uploads/2017/05/sitecheck_results.jpg" alt="" /></center></p>
<p>&nbsp;</p>
<p><strong>2) Check the Search Engines</strong>. An infection that&#8217;s been lingering for a while is likely to have already been picked up by one or more of the big three search engines: Google, Yahoo and Bing. The search engines will display a warning to users that your site is infected and dangerous to visit.</p>
<p>&nbsp;</p>
<p><center><img decoding="async" src="https://netcrafted.com/wp-content/uploads/2017/05/google_site_hack_warning.jpg" alt="" /></center></p>
<p>&nbsp;</p>
<p>You can perform a site specific search by using the <em>site operator</em>. Simply prepend the operator <code>site:</code> before your domain name. For example, I could check my site with <code>site: netcrafted.com</code>. Check for a message below one or more of your search listings. While you&#8217;re looking for the message, take a look at the content that&#8217;s been indexed; if you see unusual characters or content that clearly doesn&#8217;t belong, it&#8217;s a good sign you have an infection.</p>
<p>&nbsp;</p>
<p><strong>3) Google Search Console</strong>. If your site isn&#8217;t setup in Google&#8217;s <a href="https://www.google.com/webmasters/tools/" target="_blank" rel="noopener noreferrer">Search Console</a>, it should be. Not only will you will be able to check the malware status of your site, it also helps you monitor and maintain your site&#8217;s presence in Google Search results. It&#8217;s completely free and a no-brainer for any serious website owner.</p>
<p>Once logged into Search Console, you&#8217;ll find the status of your site under <em>Security Issues</em>. If there are notices here, you likely have issues. After you fix them, this is where you&#8217;ll return to in order to submit your site to Google for reconsideration.</p>
<p>&nbsp;</p>
<p><center><img decoding="async" src="https://netcrafted.com/wp-content/uploads/2017/05/webmasters_tools_security-issues.jpg" alt="" /></center></p>
<p>&nbsp;</p>
<p><strong>4) Scan with Wordfence</strong>. The <a href="https://wordpress.org/plugins/wordfence/" target="_blank" rel="noopener noreferrer">Wordfence Security plugin</a> is one of my favorite security plugins. I use Wordfence as a basic line of defense on my own site and sites I <a href="https://netcrafted.com/manage/">manage</a> for others.</p>
<p>Before you run a scan, go to the <em>Scans to Include</em> options section and check every checkbox except for the ‘Scan images, binary, and other files’, ‘Enable High Sensitivity’ and ‘Use low resource scanning’ options.</p>
<p>Keep in mind that relying solely on an internal scanner on an already compromised site is foolish; however, if Wordfence does find malware it&#8217;s a sign you have much bigger problems.</p>
<p>&nbsp;</p>
<p><strong>5) Visit from search, social media &amp; mobile</strong>. Some malware infections are designed to only show themselves when being referred to your site from another source. For example, visiting from Google or Facebook. The possibilities are vast, but I find it most useful to test the most popular search engines and social media platforms.</p>
<p>Before you start, I recommend loading a new browser window that isn&#8217;t logged into your site. Clear all cookies and your browser&#8217;s cache. Chrome&#8217;s Incognito mode is especially useful for this testing.</p>
<p>For search engines, do a site specific search using the <code>site:</code> operator just as before. Click on a link to your site. If anything appears abnormal, there may be a problem.</p>
<p>Do the same for Facebook, Twitter, Instagram or any other social media platform you might find your site linked from.</p>
<p>The key here is to click to your site <strong>from another site</strong>. The web server hosting your site will receive the refering URL information and this is what some malware infections use to determine whether or not to &#8220;show&#8221; themselves.</p>
<p>Finally, load your site in mobile and check it. With mobile browser usage on the rise, malware authors are now selectively targeting these views.</p>
<p>&nbsp;</p>
<p><strong>6) Examine your files</strong>. This is the going to be the hardest way to inspect your site, but if you know what you&#8217;re doing, you can spot active and inactive infections. Your host&#8217;s file manager is usually the easiest way to do this, but an FTP client will also work.</p>
<p>Look for unusually named files and inspect the contents of some commonly infected files. Malware code is often found in files such as .htaccess, index.php and wp-config.php. Compare your core WordPress file list to those found in the original <a href="https://wordpress.org/download/release-archive/" target="_blank" rel="noopener noreferrer">release package</a>. If you have shell access to your host, you can <code>grep</code> for commonly used functions in malware such as <code>eval(base64_decode</code>.</p>
<p>&nbsp;</p>
<p><strong>What Next?</strong></p>
<p>If your site is clean, now&#8217;s a good time to make sure it stays that way. Harden WordPress, keep it up to date and have a sound backup plan in place. Consider <a href="https://netcrafted.com/manage/">WordPress management</a> or <a href="https://netcrafted.com/wordpress-hosting/">managed WordPress hosting</a> if you want to offload these worries.</p>
<p>An infected site should be cleaned as soon as possible. Refer to my step-by-step guide on <a href="http://netcrafted.com/articles/repair-wordpress-malware-infection-guide/">how to remove a WordPress malware infection</a> or consider my professional <a href="https://netcrafted.com/malware/">WordPress malware removal service</a>.</p>
<p>The post <a rel="nofollow" href="https://netcrafted.com/articles/wordpress-malware-check/">6 Steps to Check WordPress for Malware</a> appeared first on <a rel="nofollow" href="https://netcrafted.com">NetCrafted</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Repair WordPress Malware Infections (Step-by-Step Guide)</title>
		<link>https://netcrafted.com/articles/repair-wordpress-malware-infection-guide/</link>
		
		<dc:creator><![CDATA[Scott]]></dc:creator>
		<pubDate>Wed, 03 May 2017 15:24:08 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://netcrafted.com/?p=1037</guid>

					<description><![CDATA[<p>Over the years I&#8217;ve cleaned many, many WordPress malware infections for customers. The following steps are the same steps I use when hired to clean a site. To be successful, you should be familiar with WordPress core files, FTP and your hosting control panel. If your host provides access to the command shell and you&#8217;re&#8230;</p>
<p>The post <a rel="nofollow" href="https://netcrafted.com/articles/repair-wordpress-malware-infection-guide/">How to Repair WordPress Malware Infections (Step-by-Step Guide)</a> appeared first on <a rel="nofollow" href="https://netcrafted.com">NetCrafted</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Over the years I&#8217;ve cleaned many, many WordPress malware infections for customers. The following steps are the same steps I use when hired to clean a site. To be successful, you should be familiar with WordPress core files, FTP and your hosting control panel. If your host provides access to the command shell and you&#8217;re familiar with Linux, even better. Let&#8217;s get started!<br />
<br />
<strong>Step 0: Backup your site.</strong> Before you even start, if you have a working backup, consider restoring that backup to a time before the malware infection occurred. Your site may still be in a vulnerable state, but it may not be the mess it is right now.<br />
<br />
If you don&#8217;t have a backup, or you need to get your site working with minimal loss since your last backup, you should backup your site before proceeding. I am not responsible for any damages you might cause your site by following this guide. When in doubt, hire a professional.<br />
<br />
<strong>Step 1: Record plugins and themes.</strong> Make a note of everything you&#8217;re using, including the URL and author, if available. If it&#8217;s not active and/or necessary, consider deleting it. Pay special attention to the active plugins; malicious plugins are often installed with seemingly innocuous names such as, <em>WordPress Dictionary</em>.<br />
<br />
<strong>Step 2: Download WordPress</strong> You&#8217;re going to need a fresh copy of the latest version of <a href="https://wordpress.org/download/" target="_blank">WordPress</a>.<br />
<br />
<center><img decoding="async" src="https://netcrafted.com/wp-content/uploads/2017/05/wordpress-logo.png" alt=""  /></center><br />
<br />
<strong>Step 3: Remove unknown users.</strong> Especially user with Administrator access. If they have content associated with them, assign it to a known user.<br />
<br />
<strong>Step 4: Reset your password.</strong> Make it something strong; I just let the auto-generator suggest something.<br />
<br />
<strong>Step 5: Secure FTP accounts.</strong> This is back in your hosting control panel and is actually two steps in one. Some panels give you the option to delete the files under the user as well, but I would not suggest this unless you have a backup and know what you&#8217;re doing. Reset the passwords on any remaining FTP accounts to something strong.<br />
<br />
<strong>Step 6: Reset any other logins.</strong> Reset any other control panel, billing or additional logins your hosting account might have.<br />
<br />
<center><img decoding="async" src="https://netcrafted.com/wp-content/uploads/2017/05/passwords-e1493778246603.jpg" alt=""  /></center><br />
<br />
<strong>Step 7: Take website offline.</strong> I typically do this by renaming the folder, but you could do it with permissions as well. This is one that&#8217;s tempting to skip over to minimize downtime. However, if you leave your site up with any active infection, you leave the door open to re-infection while you work. The short downtime will be worth the hassle of having to start over from scratch.<br />
<br />
<strong>Step 8: Check .htaccess.</strong> A commonly targeted file by malware infections. Remove malware redirects manually if you know what you&#8217;re doing. If you&#8217;re unsure, another option is to delete the file (backup first!) then recreate it through WordPress after you&#8217;re done. This is as simple as re-saving the Permalinks settings.<br />
<br />
<strong>Step 9: Archive core WordPress files.</strong> Basically you&#8217;re going to backup the old files on-site temporarily. I usually create a temp folder and move the core files there. This does <strong>not</strong> include the /wp-contents/ folder or wp-config.php.</p>
<p>This is a list of the latest WordPress core files at time of publication:</p>
<table border="0" width="80%" style="margin-bottom:20px;">
<tr>
<td><code>/wp-admin/<br />
/wp-includes/<br />
index.php<br />
wp-activate.php</code></td>
<td><code>wp-blog-header.php<br />
wp-comments-post.php<br />
wp-config-sample.php<br />
wp-cron.php</code></td>
<td><code>wp-links-opml.php<br />
wp-load.php<br />
wp-login.php<br />
wp-mail.php</code></td>
<td><code>wp-settings.php<br />
wp-signup.php<br />
wp-trackback.php<br />
xmlrpc.php</code></td>
</tr>
</table>
<p>
<strong>Step 10: Install fresh plugins and themes.</strong> Things start to get tricky here for most people. I like to start with a fresh /plugins/ and /themes/ folder and upload new copies of the plugins straight from <a href="https://wordpress.org/plugins/">WordPress</a>.  If you&#8217;ve made changes directly to your theme files, re-installing the theme may not may possible. If you have a premium theme or plugin, you will have to retrieve that the source again.<br />
<br />
<strong>Step 11: Remove malware.</strong> This is where the dirty work happens, and subsequently, where most people fail. Basically you need to remove files which contain only malware and clean files containing malware snippets. </p>
<p>Unfortunately, this is where real expertise and experience with Linux, WordPress and php becomes necessary. If you&#8217;re lucky, you&#8217;ll encounter only a couple obvious malware files to delete. In most cases though, malware files will be dispersed throughout your directory structure. Worst case, you&#8217;ll have a highly custom theme with malware embedded in every theme file.</p>
<p>I have years of experience and have developed many tools and scripts that I use for malware removal, both with and without shell access. If you&#8217;re in over your head at this point, consider <a href="https://netcrafted.com/malware/">hiring me</a> to get it done.<br />
<br />
<strong>Step 12: Create new wp-config.php.</strong> Use the existing wp-config-sample.php file as your template. Copy the database server and user from the old file. In your host&#8217;s control panel, reset the database password for the correct database to something strong and copy it into the file; do not re-use the existing password. </p>
<p>Set the authentication keys and salt values, too. Use the WordPress API to generate them instead of typing in your own random strings. </p>
<p>Finally, check your old wp-config.php for host specific settings. Copy these over into the correct place. Be sure you are not copying over malware here; the wp-config.php file is a common malware target and you&#8217;ll typically see code inserted at the beginning of the top of this file. Again, know what you&#8217;re doing or get an expert. Quick tip, take care not to insert blank space before or after the opening or closing php tags. They should be the first and last things in this file. Doing so usually leads to a WordPress site with just a white screen.<br />
<br />
<strong>Step 13: Upload WordPress</strong> Wait! This is the fresh installation you downloaded earlier. You want to upload everything <strong>except</strong> the /wp-content/ folder.<br />
<br />
<strong>Step 14: Set file/folder permissions.</strong> The <a href="https://codex.wordpress.org/Hardening_WordPress#File_Permissions">default permissions</a> for WordPress are 755 for folders and 644 for files. Your host may require different permissions; check with them if necessary.<br />
 <br />
<strong>Step 15: Reactivate site.</strong> Your site should be functioning now. If not, try accessing just the dashboard and re-save Permalinks, check plugins and the active theme. If it&#8217;s still not working, go back carefully through the steps.<br />
<br />
<strong>Step 16: Reset accounts, again.</strong> Repeat steps 3 through 6. This is probably unnecessary, but once the site is clean and running, I like to double-check just in case.<br />
<br />
<strong>Step 17: Remove old core files.</strong> These are the files you archived in Step 9. If they are in your active web folder and they are infected, there&#8217;s a small chance any call to them could re-infect everything. If they&#8217;re above your active web folder, in a folder inaccessible to web visitors, this is less of a concern. Either way, you don&#8217;t need them anymore.<br />
<br />
<strong>Step 18: Use Wordfence.</strong> The <a href="https://wordpress.org/plugins/wordfence/" target="_blank">Wordfence Security plugin</a> is a great anti-malware plugin that also has a scanner built-in. If you&#8217;ve missed anything, there&#8217;s a great chance Wordfence is going to find it. If you plan on keeping Wordfence installed long-term, which I highly recommend, I would turn off the Live Traffic Option under the <em>Basic Options</em> menu. It consumes a lot of resources and isn&#8217;t necessary for protection.</p>
<p>Before you run the initial scan, go to the <em>Scans to Include</em> options section and check every checkbox except for the &#8216;Scan images, binary, and other files&#8217;, &#8216;Enable High Sensitivity&#8217; and &#8216;Use low resource scanning&#8217; options. This will give you a thorough scan. Warnings aren&#8217;t generally infections, but you&#8217;ll have to use your own judgement here. Critical errors mean you missed something. Fix it and go back to Step 3. Sorry.<br />
<br />
<strong>Step 19: Use Sucuri.</strong> The <a href="https://wordpress.org/plugins/sucuri-scanner/" target="_blank">Sucuri Security plugin</a> is a good second line of defense. I like this plugin for monitoring changes to WordPress core files, users, theme changes via the editor and things like that. It also has a Hardening section to quickly lock down some parts of WordPress.<br />
<br />
<strong>(Optional) Step 20: Blacklist check.</strong> If you&#8217;ve been harboring a malware infection for very long, there&#8217;s a good chance you&#8217;re being flagged in the search listings by Google and possibly blacklisted by other search engines or mailing blacklists. Submit your site for reconsideration.<br />
<br />
<center><img decoding="async" src="https://netcrafted.com/wp-content/uploads/2017/05/success-e1493819290648.jpg" alt="" /></center><br />
<br />
<strong>Summary</strong></p>
<p>If you&#8217;ve successfully cleaned your site following these steps, congratulations! Going forward, it will be important to keep your site up to date and monitor the security plugins you&#8217;ve installed. If you don&#8217;t already, have an off-site backup plan in place for your files and database.</p>
<p>Did you try and fail? Or do you have a stubborn infection that keeps coming back? If this is simply beyond your capabilities, consider hiring a professional to clean your site. I have a <a href="https://netcrafted.com/malware/">WordPress malware removal service</a> for a reasonable flat fee with a 30 day guarantee. I also provide ongoing site monitoring and off-site backup with my <a href="https://netcrafted.com/manage/">WordPress management service</a>.<br /></p>
<p>The post <a rel="nofollow" href="https://netcrafted.com/articles/repair-wordpress-malware-infection-guide/">How to Repair WordPress Malware Infections (Step-by-Step Guide)</a> appeared first on <a rel="nofollow" href="https://netcrafted.com">NetCrafted</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
