Quantcast
Channel: Topic Tag: malware | WordPress.org
Viewing all articles
Browse latest Browse all 3861

Jeremy Herve on "[Plugin: Jetpack by WordPress.com] Malicious file i.e.-shims.js in the Jetpack tests directory"

$
0
0

@TonyPearl The case listed above was a false positive. The WordFence log information @signify posted when he opened the thread allowed us to find the exact line of code that was triggering the warning. That line of code didn't include any malicious code. It doesn't insert any code in any other file of your WordPress installation.

If you did experience such issues on your site, I can confirm that the malicious code wasn't added via the original ie-shims.js file in the MOJO Marketplace plugin.

Right now, I wish I had a simple solution for recovering from this.

But all I can say is - if you have this horrible infection - is to run a complete Wordfence scan. Then go through the files it shows you are infected, and clean that code out using your Cpanel code editor.
If your flyout menus start working again, you might be ok...for a while.

Once you've done all that, I'd strongly recommend following the instructions at the link below to make sure no one can get in again in the future:
https://codex.wordpress.org/FAQ_My_site_was_hacked

I hope this helps.


Viewing all articles
Browse latest Browse all 3861

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>