According to several reports, my website is infected — hxxp://wildgrounds.com
Avast says it’s JS:Iframe-EX [Trj]
Kaspersky says it’s HEUR:Trojan.Script.Iframer
Alright, that would be easy if 404javascript.js was actually on the server, but it’s not. I guess, it’s externally added/pointed by the malicious script. Which is… I don’t know. I’ve run some ssh commands for the usual stuff - eval, preg, hidden - and I’ve deleted some files, but it didn’t change anything in the end.
You’ve mentioned the Wordpress 404 page. So, it’s not a malicious script after all?
Site was vulnerable via xmlrpc.php through a WordPress flaw,
Earlier IDS alerts for: FILEMAGIC Macromedia Flash data (compressed),
see: http://urlquery.net/report.php?id=114780
Wordpress uses a 404.php server-side that gets generated as the return 404. Your site appears to have been hacked. To fix and stop avast’s alerts, you can do one of the following:
Look for suspicious elements (e.g: long strings of code) in the file and delete them
Delete the 404.php page and let Wordpress generate a new clean one [recommended]
Catch-22 here I come!
I still haven’t found any suspicious-malicious elements (!!), and using the thesis framework, I can’t delete nor generate a new clean 404 error page - I can only customize it, but doesn’t change anything.
Could it be a false report, or Sucuri’s cache not cleared yet…?
Site is no longer alerted/flagged by avast, so you have cleansed it.
Keep your website software up to date and fully patched,
stay safe and secure is the wish of,