#Update on #whackingWPYII2, the #fakeplugin invading #wordpress #wp

Have to say I was a *little* premature on declaring success. I’ve got a couple of updates to my previous post about this pernicious WordPress hack (Disinfecting for WPYII2 – the #fakeplugin invading WP and how to kill it #wpyii2 #killwpyii2).

  1. Do get rid of all the excess .htaccess, but if they keep reappearing in directories where they aren’t necessary (a) delete the code and insert some harmless text eg. #boil your head wpyii2# to stop them affecting the function of your website and (b) you’ve definitely missed some of the fake app’s php files, see (2) below.
  2. Fake php files are hidden in a variety of directories where you may not be familiar with what *should* be there. Obvious vector directories are in the plugins – particularly the ones everyone has. Akismet is an obvious one to examine. File names include a series of numerals, as well as the following that I’ve seen: index2.php, content.php, radio.php. The latter, non-numeral files, tend to be c. 4.41kb in size and will have a date last modified later that the files in which they sit. As previously mentioned wp-admin is also often used, particularly /wp-admin/css/colors/
  3. Some recommendations for those of you that can’t upgrade to the latest (greatest) version of WP – which you should absolutely do if you haven’t a very VERY good reason not to.
    1. Use a fully configurable firewall app such as WordFence – this has a bunch of very useful features straight out of the can. But it is subscription so you might want to also implement the plugins like following instead, or as well as:
    2. Login No Captcha reCAPTCHA (Google) by Robert Peake and Contributors – this will stop hackers getting into the admin area by force – or at least it has so far.
    3. WP Force SSL by WebFactory Ltd if you have SSL – which you should by now.
    4. BBQ Pro (as recommended in the last post) by Jeff Starr 
    5. Make sure you have in your “define( ‘DISALLOW_FILE_EDIT’, true );” config file, and that this file is linked in to your WP install’s directory rather than hosted there.

I am happy to report all websites are now clear and functioning perfectly, even the ones on deprecated versions of WP, plugins and themes.

Disinfecting for WPYII2 – the #fakeplugin invading WP and how to kill it #wpyii2 #killwpyii2

I’ve just spent a week disinfecting my server from this pernicious bit of ruskyhack. Not only has it completely derailed my working week, its meant that my team have had very little work over that period as my websites have been unable to process orders. Whoever the surnames Skorobogatov, Serebryakov and Biryukov refer to, well, they should be ashamed of themselves.

The context is this. On a server (not the one this blog is hosted on) I have c. twenty installs of WordPress, plus several apps which are collected in three or four directories. I’ve got a variety of domains and subdomains, as well as password-protected directories for particularly sensitive work apps.

Now if I say that some of these apps take data from my WP install DB repackage it and spit it out via the Royal Mail API into their Click and Drop app, you will get why this fake plugin has completely disrupted that workflow. And of course the problem with some of the WP installs I am using is that, because of its wide integration into our production systems, I cannot upgrade either the WordPress version or the plugins associated with it.

WPYII2 found its way onto the server mid-week last week and the first I knew about it was some code appearing at the top of the homepage of several of my sites.

The damage was extensive. I lost three separate bespoke apps we use regularly for business because the fake plugin deletes top level ‘index.php’ files when they are not associated with a WP install. Luckily I had different earlier iterations available on the server so I could cobble together replacements – which ended up improving on the earlier versions.

As for the WP installs, well, they all fell over, repeatedly. I ended up playing whack-a-mole for a couple of days while trying to understand what the hell was going on. It didn’t help that there were plenty of posts from security firms saying, yes, this is a thing, and we’re here to help you get rid of it, but very few saying this is how you do it. I *think* I have done it, and the solution has ended up being cobbled together through trial and error and some helpful non-specific security posts from a variety of sources [for example]

So how to rid your WP install of this vicious fakery?

  1. Open top-level index.php and delete the machine code sitting in lines 1-3
  2. Delete any ‘new’ files at top-level that you don’t expect to see.
  3. In cpanel use phpmanager to flip between php version to disable the fake plugins chron jobs
  4. Replace the .htaccess file text with the single or multiple install vanilla code from here: https://wordpress.org/support/article/htaccess/
  5. Delete all .htaccess files below the top level on the WP install.
  6. Delete any folder in plugins which isn’t something you have installed eg. the folder called “wpyii2”
  7. Look for any folders / files which have a recent ‘last modified’ date which you don’t recognise as being something you did.
  8. Repeat 1 through 4 if at anytime the website won’t display / shows the code at the top of the page again.
  9. Check 5-7 if you have to repeat 1 through 4
  10. Once you have a clean install, or at least as clean as you can make it, and you don’t have to maintain an outdated version of WP, upgrade to the latest version of WP.
  11. Upgrade all your plugins and themes. If you have made bespoke versions of themes by changing the code, I’d recommend trying to find a different way of creating the same effect through the customization options for that theme rather than altering the php.
  12. Protect the ‘wp-admin’ directory with a password (check to see whether this works for your install of WP – I’ve had mixed results)
  13. Install a firewall plugin – eg. BBQ Pro or similar
  14. Install a 2FA plugin
  15. Install captcha on login plugin.
  16. Install a SSL/HTTPS force plugin – assuming you have a live SSL certificate for the relevant domain.
  17. For 13-15 remember to do this for all iterations of a multisite – although BBQ Pro will activate across the network without further configuration (which I like).
  18. With your wp-config.php file, add the following code before the ‘Happy Blogging’ message –> “define( ‘DISALLOW_FILE_EDIT’, true );” – this stops all editing of php / css / html within the WP environment (see note 11 re: editing themes etc.)
  19. Consider moving the config file to the top level of your server, ie. above the ‘public_html’ directory, using the php code ‘require_once ‘/home/username/wp-config.php’;’ on the ‘wp-config.php’ file within the WP install directory.

As of 15th June 2022 I seem to have reached a stable environment with the fake plugin effectively being locked out by the abovenoted steps. However, I continue to monitor the server, and use downnotifier.com to give me immediate intel if things go awry. Any recommendations on other steps to keep this stuff away, let me know!

The cost of all of this to my business? Who knows? My time / stress? The lost orders? The lost IP? Those who black hat hack should reflect on their lives and wonder whether their skills could be better used elsewhere.

The ZippedyZoom.Club mixes #liveactors, #creative #makers, #fineartists & #childrensactivites into a compelling, colourful brew!

Professor Zippedilla Zoom

As web developer and visual designer I’ve been working on ZippedyZoom.club which is part of TWTC’s response to Covid-19 – providing both a portal for kids to access fun activities and awesome stories, and a place for creative practitioners of all sorts to keep working. With funding for an initial 12-week run, we’re focussed on delivering content beyond that endpoint. Have a look here.

Dorothy Gale earns ‘ZoomPoints’ during lockdown!

#onlinestartup: Essential tools and skills for a successful online business startup

As I was working on my Q2 VAT return I was wondering what I would post about today – I was using excel, textedit, MySQL, phpmyadmin and cpanel to create the documents I needed to send off to our accountancy firm and thought, well, what are the essential components of a successful online business?

One of the things that immediately struck me was that aside from a wide skillset, which is the IP we work from, everything we use is either open source / free or priced at a marginal cost to the business. In other words, for anyone to set up an online business, all they need are the skills and the time, the rest is readily available if they have connectivity and a computer or even a tablet.

My second thought was that actually we do have some software which we have had to purchase, mostly the Adobe Creative Suite (Photoshop, Illustrator, Indesign … ) but there are open source alternatives freely available.

I’ve listed everything below. Some of it is generic, some is specific – like the hosting solutions we use – how we knit it all together to create a market-leading business like Dunans Castle Limited, is another matter 😉

Foundation for online presence:

  • Open Source software – Linux / Apache / MySQL* / PHP*
  • Domain registrars: Bluehost.com (Top Level Domains) and 123-reg (UK domains)
  • Hosting solution: Mediatemple (US) and UnitedHosting (UK)

Maintaining online presence:

  • WordPress* including:
  • Cpanel* (maintaining the server)
  • phpmyadmin*
    • for website health
    • for customer metrics
    • for essential metadata

Communications & Marketing:

Spreadsheet / Word Processor

  • Excel for detailed cashflow analysis
  • Google spreadsheets for shared information
  • Word for compatibility
  • TextEdit or Textmate for csv, text & sql manipulation

Shared Information

  • Dropbox – for shared proprietory documents eg. .ai, .psd, .pdf, .jpg
  • Google Drive – for shared non-proprietory docs eg. simple spreadsheets and collaborative how-tos
  • Google Calendar for scheduling

Proprietory Software

  • Illustrator
  • Photoshop
  • Microsoft Office

* skills or competencies which can take several years to acquire.

 

 

@TWTC website design refreshed with visually edgier theme, giving better access to all of the TWTC content

twtc-newFor the last couple of years the TWTC website has been using a theme from Pagelines which has served us well. However, we started to hit its limits when the number of pages on the website exceed the menu functionalities capacity (128 pages, I think!). So it was back to the drawing board, or rather back to adapting one of WP’s venerable themes. Twenty Twelve lent itself readily and along with a sliding image plugin and some nifty CSS work, the website now looks spiffing and works properly…

… well mostly, Firefox, is good, but the webkit browsers Safari and Chrome are not rendering the sliding images at the correct width. I’ll be working on this over the next few days so check back then (those of you with webkit browsers that is!)

Set-up

Setting up CCC to keep up with activity on a daily basis and to distribute to Twitter and FB

X