Malware injection attack is spreading like wildfire these days, and countless websites have been affected. The attack is done via a compromised FTP, and many believe that the virus can actually “sniff out” FTP passwords and send it back to the hacker. The hacker then uses your FTP password to access your website and add malicious iframe coding to infect other visitors who browse your website.
Most web browsers will put up a notice when they’ve detected malware in your website. This prevents other people from unknowingly downloading the malware. If you’d like to check if your website has been infected, use the Website Security Check from Unmask Parasites.
You might also like to take the following preventive measures to protect your website from malware:
1. Upgrade your Adobe Reader to the latest version
2. Install anti-virus software like Malwarebytes and Comodo
3. Use SFTP instead of FTP
4. Remove all malicious coding from your website
5. Upgrade to latest WordPress if you have a self-hosted Blog
6. Change your FTP password
For further reading, check out Hidden iframe injection attacks
2 thoughts on “Malware Injection Attack”
A friend of mine with his website hosted in one of the biggest hosting provider in Malaysia is sharing his experience with me:
“During those period of time, I emailed XXXXXX (my hosting) few times, in which they could not help much. I also emailed Google few times to plead and appeal, as to not penalize my website anymore, and get it out from their sandbox.”
Through the cause of malware attack is a compromise of security on client-side level. Yet, there are many thing a web hosting can do, including informing all customers to change their FTP password (or do a FTP reset for all), to remove hidden iframe codes in bulk, etc.
Latest malware attacked add malicious code to your Post. They gain access to your DB through older version of Phpmyadmin