eval(base64_decode(error)
-
Topic
-
Hi Jason,
I have been slowly tracking a hack that happens to my wordpress install (seattlegirlschoir.org).“eval(base64_decode(error);”
shows up in place of all of the code in the file “content-404.php”
The hacker also changes the index.php for the entire site and then redirects happen when regular users hit our site with a page that does not exist, and sometimes even with any page. I could say more, but I bet you already know all about this type of phenomena….
Obviously I doubt this to be caused by or related to your systems, but after months of dealing with this, I am slowly starting to remove php plugins from the site. (Akita or TBlvd plugins will be last, if I ever get that far. I plan to switch hosts before that, just to see if it is the host.)
I am about to remove the calendar by timely called the allinone calendar. My error log always shows lots of errors in their code whenever this hack appears. The log also shows errors in the 404 file inside the akita child theme (since that file has been changed by the hacker).
Any ideas from you would be most welcome as this is a long horrible process. No one knows what code is causing it or if the host account may be the cause, so I just have to make one change and wait to see if we get hacked, then replace the two files with good ones and try again….
Thanks,
-SS
- The forum ‘Akita Responsive WordPress Theme’ is closed to new topics and replies.