If the malware files keep returning, you better check your site permissions and 
extensions/modules on the site. Moving it to a different hosting company won’t 
fix it.

Terry

 

From: clamav-users <clamav-users-boun...@lists.clamav.net 
<mailto:clamav-users-boun...@lists.clamav.net> > On Behalf Of MOHAMED OMAR 
MAKRAM via clamav-users
Sent: Wednesday, March 27, 2019 12:26 PM
To: ClamAV users ML <clamav-users@lists.clamav.net 
<mailto:clamav-users@lists.clamav.net> >
Cc: MOHAMED OMAR MAKRAM <adamupaccount...@gmail.com 
<mailto:adamupaccount...@gmail.com> >
Subject: {Disarmed} Re: [clamav-users] Installing question

 

Thank you, Scott, but that is not the site I am worried about, and I don't have 
a problem currently because I am paying for virus protection and a firewall at 
$21 per month for each site. 

I want to stop paying for a virus and a firewall for all my sites and move it 
out from GoDaddy and put it into Hostgator. I am done with GoDaddy. Right now 
you won't be able to see any issues because the virus-created files are 
quarantined. The minute I stop paying for the virus scan and firewall, even if 
I deleted those quarantined files, I will have them coming back again and again.

 

 

My sites are:

 
<https://llink.to/?u=https:%2F%2Fwww.twelvestepjournaling.com%2F&e=465642cfc9f048e98cc85ab6a7990aa6>
 MailScanner has detected a possible fraud attempt from "llink.to" claiming to 
be https://www.twelvestepjournaling.com/  

 
<https://llink.to/?u=https:%2F%2Fwww.intentionalbeings.com%2F&e=465642cfc9f048e98cc85ab6a7990aa6>
 MailScanner has detected a possible fraud attempt from "llink.to" claiming to 
be https://www.intentionalbeings.com/ 

 
<https://llink.to/?u=https:%2F%2Fwww.cocreationsmanager.com%2F&e=465642cfc9f048e98cc85ab6a7990aa6>
 MailScanner has detected a possible fraud attempt from "llink.to" claiming to 
be https://www.cocreationsmanager.com/ 

  <https://pixel.salesfla.re/img/73d10c5ea4770e89b417f7082ecc684f> 

 

On Wed, Mar 27, 2019 at 10:58 AM SCOTT PACKARD via clamav-users 
<clamav-users@lists.clamav.net <mailto:clamav-users@lists.clamav.net> > wrote:

There's almost nothing going on on your web site http://tucson-az-cpa.com/.  It 
should be an easy job to restore it from whatever offline source you have.

If all you're worried about is "visitors to your site they get a message that 
the site is unsecured", I think getting https:// going is what you're after.

Maybe go and read https://letsencrypt.org/ .

 

Regards, Scott

 

From: clamav-users <clamav-users-boun...@lists.clamav.net 
<mailto:clamav-users-boun...@lists.clamav.net> > On Behalf Of MOHAMED OMAR 
MAKRAM via clamav-users
Sent: Wednesday, March 27, 2019 10:32 AM
To: ClamAV users ML <clamav-users@lists.clamav.net 
<mailto:clamav-users@lists.clamav.net> >
Cc: MOHAMED OMAR MAKRAM <adamupaccount...@gmail.com 
<mailto:adamupaccount...@gmail.com> >; J.R. <themadbea...@gmail.com 
<mailto:themadbea...@gmail.com> >
Subject: [External] Re: [clamav-users] Installing question

 

I've had this for few months. The only thing i was able to do is to pay for 
virus protection but it is so expensive. 

Is there a way to find those hidden files? Do you think they are in the db or 
in the files? 

I am moving out to another server right now. Is there a good process to do this 
without copying the virus along with the files?

 

Thanks for your help



 

On Wed, Mar 27, 2019 at 10:13 AM J.R. via clamav-users 
<clamav-users@lists.clamav.net <mailto:clamav-users@lists.clamav.net> > wrote:

> I do not know if the virus is on the server, in the files, or in the db.
> Here is what I know:
> Under each folder of each site, files appear with a name such as:
> f68z319m.php
> When visitors go to my websites, they get a message that the site is
> unsecured
>
> Does this information help identify the issue, or where to look for the
> virus?

Did you look at the contents of those files? Sounds like someone is
exploiting code to upload files which could then be used to do all
sorts of nasty things. That could be an issue with drupal or packages
on your system being out of date. Often that is just the first step
and once they upload one file they use it to upload a lot more in
hidden directories and modifying files and such...

I hope you have a recent backup...

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net <mailto:clamav-users@lists.clamav.net> 
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml




 

-- 

Mohamed Omar Makram, CPA

Osiris CPA, PLLC <http://tucson-az-cpa.com/> 

Tele: (520) 906-1863

Fax: (520) 448-0706

 


_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net <mailto:clamav-users@lists.clamav.net> 
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml




 

-- 

Mohamed Omar Makram, CPA

Osiris CPA, PLLC <http://tucson-az-cpa.com/> 

Tele: (520) 906-1863

Fax: (520) 448-0706

 

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to