Possible solutions of your questions

  hosting
<< Previous       not working sites

Question: *.*.uahttp://*.*.*http://*.*.*/ and so on
Answer:

Hello.

`ll find amps. Your issue is being dealt with.

Answer:

Domain avtograff.in.ua does not exist

others sites  again, You are infected. What are the measures taken last time to clean the sites and predetermine re-infection?

 

Answer:

unfortunately, in became also all infected.

Answer:

your account proveryaetsya for viruses. after verification you will be given a report

Question: Yesterday morning the sites were still working, now all are not working
Question: Backup on Vera evening You?
Answer:

this backup, we have no

here Otchet

http://avtograff.dp.ua/AI-BOLIT-REPORT-__-******-**-**-****_**-**.html

 

criticisms
a Vulnerability in the scripts (**)

/home/domboga*/public_html/avtograff.dp.ua/wp-content/themes/arctica/AIT/Framework/Libs/timthumb/timthumb.php - RCE : TIMTHUMB CVE-****-****,CVE-****-****
/home/domboga*/public_html/avtograff.dp.ua/wp-content/plugins/revslider/inc_php/image_view.class.php - NI : REVSLIDER : http://www.exploit-db.com/exploits/*****/
/home/domboga*/public_html/libraries/joomla/session/session.php - RCE : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions
/home/domboga*/public_html/libraries/joomla/filesystem/file.php - NI : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions
/home/domboga*/public_html/vitaly/detailing.dp.ua/wp-content/themes/arctica/AIT/Framework/Libs/timthumb/timthumb.php - RCE : TIMTHUMB CVE-****-****,CVE-****-****
/home/domboga*/public_html/vitaly/detailing.dp.ua/wp-content/plugins/revslider/inc_php/image_view.class.php - NI : REVSLIDER : http://www.exploit-db.com/exploits/*****/
/home/domboga*/public_html/avtograff.in.ua/assets/modules/evogallery/js/uploadify/uploadify.php - NI : UPLOADIFY : CVE: ****-****
/home/domboga*/public_html/nta.in.ua/assets/modules/evogallery/js/uploadify/uploadify.php - NI : UPLOADIFY : CVE: ****-****
/home/domboga*/public_html/plugins/editors/tinymce/jscripts/tiny_mce/plugins/tinybrowser/tinybrowser.php - NI : TINYMCE : http://www.exploit-db.com/exploits/****/
/home/domboga*/public_html/plugins/editors/fckeditor/editor/filemanager/connectors/uploadtest.html - NI : FCKEDITOR : http://www.exploit-db.com/exploits/*****/ & /exploit/***
/home/domboga*/public_html/administrator/components/com_media/helpers/media.php - NI : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions

 

why from the last time you did not eliminate vulnerability? we have already cited report

your sites are hacked because they have open.

Question: Just the access to everything is just me, others have different admins. But I have the access to lots of things: websites to *.*.*cms are the same ,but access to betapam there for ** days), farms SharePoint, systems upravleniya business processes, * systems and ....Neither of which do not break and do not infect. Before moving to You-for five years, any departure from Google or complaints. You advised friends (before moving, like a test VPS) - so they have now the same problem. Maybe I do not understand? What is the last backup You have?
Question: Hacked all at once?
Answer:

they have already very long been all hacked. you have repeatedly provided reports about existing vulnerabilities.

you focus not want to see nxj your sites vulnerable

show again

criticisms
a Vulnerability in the scripts (**)

/home/domboga*/public_html/avtograff.dp.ua/wp-content/themes/arctica/AIT/Framework/Libs/timthumb/timthumb.php - RCE : TIMTHUMB CVE-****-****,CVE-****-****
/home/domboga*/public_html/avtograff.dp.ua/wp-content/plugins/revslider/inc_php/image_view.class.php - NI : REVSLIDER : http://www.exploit-db.com/exploits/*****/
/home/domboga*/public_html/libraries/joomla/session/session.php - RCE : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions
/home/domboga*/public_html/libraries/joomla/filesystem/file.php - NI : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions
/home/domboga*/public_html/vitaly/detailing.dp.ua/wp-content/themes/arctica/AIT/Framework/Libs/timthumb/timthumb.php - RCE : TIMTHUMB CVE-****-****,CVE-****-****
/home/domboga*/public_html/vitaly/detailing.dp.ua/wp-content/plugins/revslider/inc_php/image_view.class.php - NI : REVSLIDER : http://www.exploit-db.com/exploits/*****/
/home/domboga*/public_html/avtograff.in.ua/assets/modules/evogallery/js/uploadify/uploadify.php - NI : UPLOADIFY : CVE: ****-****
/home/domboga*/public_html/nta.in.ua/assets/modules/evogallery/js/uploadify/uploadify.php - NI : UPLOADIFY : CVE: ****-****
/home/domboga*/public_html/plugins/editors/tinymce/jscripts/tiny_mce/plugins/tinybrowser/tinybrowser.php - NI : TINYMCE : http://www.exploit-db.com/exploits/****/
/home/domboga*/public_html/plugins/editors/fckeditor/editor/filemanager/connectors/uploadtest.html - NI : FCKEDITOR : http://www.exploit-db.com/exploits/*****/ & /exploit/***
/home/domboga*/public_html/administrator/components/com_media/helpers/media.php - NI : https://docs.joomla.org/Security_hotfixes_for_Joomla_EOL_versions

 

it`s a vulnerability which had to be eliminated.

in became also have a lot of files with viruses.

 

your sites are vulnerable to hacking. you even pereveli wamukota - without the vulnerabilities of your sites will break. using a hacked site to break a nearby website in your account and so on ad infinitum until you`re all correct

Question: Okay, okay: yesterday morning the sites worked. You have a backup? There are options for site recovery?
Answer:

we have a full backup files from the ** of September, it is already all infected, the virus you have there on any date.

we can vosstanovit files from that backup but the issue with the vulnerability is not solve. you saw the report. until you correct that vulnerable - will break

Question: Please restore this backup without email,and give a link to download it. From him we have to analyze and treat
Answer:

we vosstanovili

can scan again. because of the size of the site it will take a couple of hours.

Question: OK. thank you. Give a link plz. What would I not do backup now once again
Answer:

link to what? we have restored files from backup.

Question: Link to backup. I would like to work with him locally
Answer:

you can make a backup in your control panel

to work with him momentuem this https://revisium.com/kb/scan_site_windows.html

but before to treat , understand vulnerabilities and their sakray

you can also connect https://virusdie.ru/ they have one day free. this is after all pre-clear and close all.

Question: \"but before to treat , understand vulnerabilities and sakray them\" - I don`t quite understand how close. Now updated the scripts to change the passwords. If there is a link to the manual - I would be grateful
Answer:

here are a few of your uyazvimostey

http://www.federacel.ru/blog/uyazvimost_plagina_revslider_privela_k_zarageniyu_******_wordpress_sajtov_novym_virusom/goods_***/

https://revisium.com/ru/blog/joomla_rce_all_versions_affected.html

for the rest we recommend you to consult the professionals for solution of this question

Question: Good afternoon. Now all the renamed directory sites (the site in Rute disabled long ago). Anyway * rolls. View that the processes loading the server. I changed the folder paths of the sites are not available, and the processes loading the server, please see
Answer:

please Wait, your issue is being dealt with.

Answer:

the virus again virus

domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ******* *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ******* *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** **** ? S Sep** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ****** *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ******* *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php
domboga* ******* *.* *.* ****** ***** ? S **:** *:** /usr/bin/php /home/domboga*/public_html/rnt.in.ua/f*jx/save/sexthe.php

Question: Sooner than **e backup no
Question: ?
Answer:

no. moreover, it does not make sense because the infected files you with dates throughout the year. you don`t have paying any attention to their site, so it is impossible to do. the sites need to monitor regularly to poerate and update. we have an order of scan, you can always make use of it, it`s completely free

Question: And yet in bekapai makes sense and have standards! Or do you not know it? You help more than I can not, I understand correctly?
Answer:

 

what kind of standards are we talking about? show these standards.   bekapai you are all infected. the meaning of Taha bekapai no. you have too long delayed the problem

 

Question: What are backups??? Let there anything, are there? Before **. To ** just worked sites!
Answer:

We ostavlyali yesterday and everything worked. solve problems with viruses you will have to vosstanavlivat sites every few minutes.

Question: Worked only the main page. Any transitions not working on the same Dataline
Answer:

you had vosstanovit original .htaccess rules redirect


<< Previous