{"id":20494,"date":"2023-05-01T12:19:51","date_gmt":"2023-05-01T11:19:51","guid":{"rendered":"https:\/\/wpbeveiligen.nl\/?p=20494"},"modified":"2023-05-01T12:24:49","modified_gmt":"2023-05-01T11:24:49","slug":"remove-malware-from-server-heres-where-to-look","status":"publish","type":"post","link":"https:\/\/wpbeveiligen.nl\/en\/remove-malware-from-server-heres-where-to-look\/","title":{"rendered":"Remove malware from server – here’s where to look!"},"content":{"rendered":"

Hackers – actually automated hackbots\/scripts, do everything they can to hide their malware well in the server between your WordPress core files, the uploads folders, or between the plugins. There is some strategy behind placing malware and there are specific folders where hackers usually hide their malware.<\/p>\n

In which folders can you often find Malware in a hack?<\/h3>\n

Look in the folder above the public_html<\/strong>
\nThe folder where your website resides is usually called public_html, www, or httpdocs.
\nAbove (or in front of) those folders you have other server folders, and with a bit of bad luck, a hacker or script got access to those folders above and hid the malware there….
\nPs: Keep in mind that sometimes you can’t even access those upper folders with a standard ftp program and a standard ftp account.
\n\"boven
\n<\/em><\/p>\n

Look in the uploads folders<\/strong>
\nMany plugins have write permissions and access to uploads folders that are freely writable.
\nTherefore, all it takes is a small modification to a leaky plugin to store unwanted files.
\nWith an extensive directory structure spanning years and months, there are plenty of places to hide malware!\"\"<\/p>\n

Look in the WordPress base folders<\/strong>
\nWordPress itself is also where hackers often put files, think of the wp-includes and the wp-admin folder.
\n\"in<\/em><\/p>\n

Look in plugins & theme folders<\/strong>
\nMany websites have between 7 and 30+ plugins, enough space to place a few unsavory files!<\/p>\n

\"in<\/p>\n

Waarom de mappen boven de public_html & de uploads mappen <\/strong>de grootste voorkeur genieten bij hackers en hackbots? Dat is omdat de map boven de public_html + de uploads mappen<\/span> niet ge-update worden waardoor de malware er langer kan blijven staan.<\/p>\n

Sluw h\u00e8?<\/p>\n

Naast de beste verstopplekken om malware neer te zetten worden er ook diverse verstop-strategie\u00ebn gebruikt. Hackers en bots hebben strategie\u00ebn om de malware zo lang mogelijk in je website te houden.<\/p>\n

De strategie bij het plaatsen van malware plaatsen<\/h3>\n

Strategie 1: het script zet de malware in elke map!
\n<\/strong>Als een hack eenmaal in je server is binnengedrongen gaat zo’n hack in 20% van de gevallen over tot het verstoppen van malware in ELKE MAP<\/span>. In de hoop dat je er 1 vergeet wanneer je de hack probeert te verwijderen. De kans d\u00e1t je de malware vind, of dat de malware door de server ontdekt wordt is groter, maar ja.. zie maar eens GEEN enkele map over het hoofd te zien bij het verwijderen!<\/p>\n

Strategie 2: het script zet de malware alleen 3 mappen diep
\n<\/strong><\/p>\n

Voor een script is het gemakkelijk om alleen malware te plaatsen in mappen met 3 lagen bovenliggende mappen. De malware wordt op deze manier zo ver mogelijk UIT HET ZICHT<\/em><\/span>\u00a0geplaatst.<\/p>\n

Strategie 3: het script zet de malware IN een bestaand bestand<\/strong><\/p>\n

Dit zijn de ergste! Dan is de malware IN een bestaand bestand<\/span> geplaatst. Je zult dan heel specifiek naar een lijn code op zoek moeten.. een speld in een hooiberg als je niet weet hoe je moet zoeken!<\/p>\n

Ok\u00e9, je hebt nu een idee WAAR je malware kunt gaan zoeken. Nu vraag je jezelf natuurlijk af: hoe herken ik een virusbestand<\/strong>, malware bestand<\/strong> of hack<\/strong> tussen tientallen legitieme noodzakelijke bestanden?<\/p>\n

Dat kun je in het volgende artikel lezen: ,,Zo herken je een virus bestand<\/a>“.<\/em><\/p>\n

Why the folders above the public_html & the uploads folders<\/strong> are most preferred by hackers and hackbots? It’s because the folder above the public_html + uploads folders don’t get updated which allows the malware to stay there longer.<\/p>\n

Smart huh?<\/p>\n

In addition to the best hiding places to put malware, various hiding strategies are also used. Hackers and bots have strategies to keep malware in your website for as long as possible.<\/p>\n

The strategy when placing malware places<\/h3>\n

Strategy 1: The script puts the malware in every folder!<\/strong>
\nOnce a hack has penetrated your server, in 20% of cases such a hack proceeds to hide malware in EVERY MAP. Hoping you will forget one when you try to remove the hack. The chance that you find the malware or that the malware is discovered by the server is higher, but hey… try NOT to overlook a single folder when deleting it!<\/p>\n

Strategy 2: the script only puts the malware 3 folders deep<\/strong><\/p>\n

It is easy for a script to place malware only in folders with 3 layers of parent folders. This way, the malware is placed as far as possible OUT OF THE SIGHT.<\/p>\n

Strategy 3: the script puts the malware IN an existing file<\/p>\n

These are the worst! This is when the malware is placed IN an existing file. You will then have to look very specifically for a line of code…a needle in a haystack if you don’t know how to search!<\/p>\n

Okay, you now have an idea WHERE to look for malware. Now of course you are asking yourself: how do I recognize a virus file, malware file or hack among dozens of legitimate necessary files?<\/p>\n

You can read about that in the following article: ”How to recognize a virus file<\/a>”.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Hackers – actually automated hackbots\/scripts, do everything they can to hide their malware well in the server between your WordPress core files, the uploads folders, or between the plugins. There is some strategy behind placing malware and there are specific folders where hackers usually hide their malware. In which folders can you often find Malware […]<\/p>\n","protected":false},"author":4,"featured_media":20100,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[186],"tags":[],"_links":{"self":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/20494"}],"collection":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/comments?post=20494"}],"version-history":[{"count":0,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/20494\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media\/20100"}],"wp:attachment":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media?parent=20494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/categories?post=20494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/tags?post=20494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}