• caglararli@hotmail.com
  • 05386281520

WordPress redirect hack – can’t find how they did this [closed]

Çağlar Arlı      -    31 Views

WordPress redirect hack – can’t find how they did this [closed]

I have a small WordPress website, and it started to give me some redirects where it is not supposed to. I checked hashsums with wp core verify-checksums and the same for plugins. The problem is - external redirect checkers don't find anything, because it redirects only when I log in.

After I log in, a plugin (sabai, sabai-discuss) gets installed ultr-seo-processor-wp.zip which I didn't install. I can't understand how this is possible if checksums verify.

I have a theme (Unicorn 2.1.3) and a paid plugin which is not checked against checksums. The theme is the main suspect because it hasn't been updated in a long time.

Are there any offline scanners which will work without running webserver?

If I can't find a better solution, I'm thinking of getting rid of the theme, but sabai and sabai-discuss are a crucial part, so I'm looking for a solution to clean up what they inserted there, but I don't know how to find it.

I'd like to keep the modified theme too, because it works too well and everyone is used to it.

How should I approach finding what they added there? I suppose there are some calls for WordPress api in the theme in the admin panel they call to install plugin. What to grep?

My main hope here is that it's an automated hack that some of you have seen in your projects.

I found some files with names like "hidden.php" which were added by the hacker and I removed them, but the problem remains. So I'm asking for advice on what to look for.

I also checked the timestamp of the freshly downloaded zip file of ultra-seo-processor-wp.zip and examined nginx logs. There were no requests but from me logging in admin panel, so I think there should be some WP API calls added in some theme files.