This already happened to me a few months ago and I had to edit some files, but right now I can’t find any malicious code… I tried a Scan on VirusTotal and everything is fine, no errors and it tells me the site is clean.
When scanning your site, I see sucuri reports an issue with Wordpress software here: Wordpress internal path: -/homez.424/unvoyages/www/wp-content/themes/Aggregate/index.php
Check your Wordpress version for updates and patches, else your site software may still be vulnerable to certain exploits, and you run the risk of being re-infected.
Additionally some general security tips for that particular website:
You use cookies on your start-site, you use cookies without Platform for Privacy Preferences Project (www.w3.org/P3P/). Your website gives away through the “X-Powered-By” HTTP Header, that
content is being dynamically generated. Remove that header.
The server transmits the full server software version number. This should be avoided. Attackers could get information what exploits to run against the server. Your site uses graphical tracking, like a banner for instance. The IP your website is on is notorious because of a Zeus Koobface there, one malciious site still active and up via that IP, see: http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=http%3A%2F%2Fresistances.org%2Flink.2012.php%3FynyGIS%3D64ko6
and see the bizimbal report here: http://www.bizimbal.com/odb/details.html?id=619980
Thanks for replying so fast ! I could find and remove the malicious code so I have no more alerts from avast It was located in functions.php file, a simple script… I also made the update to the last version of Wordpress, hope it will be ok…
Also, thanks for all your security tips for my website. I however have a few questions :
1/ I didn’t understand what you said about the cookies issue, what should I do to fix it ?
2/ Which header should I remove ? I have this in my header.php :
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" <?php language_attributes(); ?>>
<head profile="http://gmpg.org/xfn/11">
3/ How can I avoid the server from transmiting the full server software version number ?
4/ You said the IP my website is on is notorious because of a malicious site, is there anything I can (or should) do ?
Anyway thanks again for your reply, you’re awesome !
The removal of the full version number of the server software can be found in the server software manual/tutorial, for apache it is done like this: http://www.ducea.com/2006/06/15/apache-tips-tricks-hide-apache-software-version/
you have the default setting - link author: Linux Security’s Marius.
It may not be your concern when you are not responsible for the server software security,
attackers prefer to abuse CMS systems there, like Wordpress, Joomla etc. Update and patch website software regularly. Also watch out for PHP hacks, simple and dangerous!
The tracking through a banner for instance is a minor issue i.m.o.,
Well, as I told you last week I could find and remove the malicious Javascript code in functions.php and thought it was solved. But today I got a new Avast alert when I visited my website (with Chrome and IE, but no alert with Firefox… weird)
I checked my functions.php file once again and found the malicious JS code that I deleted last week ! How can it be possible ? I changed my password and updated to Wordpress 3.3.1 but the malicious code was put nevertheless…
I downloaded his file on rapidshare to see which part of the code he had removed, and noticed that he removed all the php code + JS script whereas I just removed the JS script as below :
There is a reason for this re-occuring infection and it is with php.
Check there, these are particular campaigns that make use of a vulnerability likethe thi. thumb one,