[nycphp-talk] I've been hit with an eval(base64_decode("....")) injection attack
Rob Marscher
rmarscher at beaffinitive.com
Fri Feb 24 16:11:03 EST 2012
On Feb 24, 2012, at 4:08 PM, Rob Marscher wrote:
> On Feb 24, 2012, at 4:04 PM, David Mintz wrote:
> ...snip...
>> ob_start('mrobh')
> ...snip...
>
> I did a little googling and found this pretty relevant article:
> http://danhilltech.tumblr.com/post/18085864093/if-you-get-eval-base64-hacked-on-wordpress-dreamhost
>
And another cleanup suggestion:
http://blog.sucuri.net/2010/05/simple-cleanup-solution-for-the-latest-wordpress-hack.html
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nyphp.org/pipermail/talk/attachments/20120224/36a69736/attachment.html>
More information about the talk
mailing list