Possible solutions of your questions

  hosting
<< Previous       GetBlogInfoList.php

Question: Good day!In the site root /home/f3pgs5dt/public_html/ file is located GetBlogInfoList.php. When I remove it, the file instantly gets back up. No active FTP sessions no. They tried to block the site via .htaccess, the file still comes back.Could you explain its origin?
Answer:

Hello. ftp is not the only way to download files. the file is obviously malicious. now we`ll scan the website for viruses and provide you with a report. more likely vsgo Your website has critical vulnerabilities or was infected before that.

Question: At the moment the site closed.http://aep-energo.ru/ - 403.The fact that this file appears in the root directory using any of the website scripts are excluded.Active FTP sessions no.Try to delete the file.Where can I see the logs of login to the CPanel file Manager ?
Answer:

it is

http://aep-energo.ru/AI-BOLIT-REPORT-__-983716-09-06-2016_18-32.html

 

the site has a critical vulnerability required to eliminate

a Vulnerability in the scripts (3)
/home/f3pgs5dt/public_html/rez2/libraries/joomla/session/session.php - RCE : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions
/home/f3pgs5dt/public_html/libraries/joomla/session/session.php - RCE : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions
/home/f3pgs5dt/public_html/rez/libraries/joomla/session/session.php - RCE : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions

 

 

description of the problem and eliminate metody

https://revisium.com/ru/blog/joomla_rce_all_versions_affected.html

Question: At the moment the site gives !all! 403.The appearance of this file is not a consequence of the virus on the website, as a hacker it just wouldn`t start.
Answer:

the appearance of this file a consequence of the vulnerability of the site.


<< Previous