• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion
  • Inviting everyone to the UX test of a new security feature in the WP Toolkit
    For WordPress site owners, threats posed by hackers are ever-present. Because of this, we are developing a new security feature for the WP Toolkit. If the topic of WordPress website security is relevant to you, we would be grateful if you could share your experience and help us test the usability of this feature. We invite you to join us for a 1-hour online session via Google Meet. Select a convenient meeting time with our friendly UX staff here.

Issue xmri Infected

Inma

Regular Pleskian
Server operating system version
Debian
Plesk version and microupdate number
18.0.55
This server has had an infected hosting which created these files and ran that command using the FTP user and there was no way to stop it, every reboot and change of ftp data... was re-run

that hosting no longer has a web site only mail . So in theory we thought it was fixed but NO, now run this with user 10007

I search xmri no longer shows me any files because the infected website has NO website or place to upload files or infected files... any ideas ?


1698501437784.png


1698501115480.png
 
You could try to run maldetect (that's a third party tool) to scan all files on the server for malware, because there might still be infected files on the server if the software managed to access the root level. You should also check that your /tmp partition (or directory) do not have any file execution permissions.
 
hello, yesterday I rebooted the machine and it has already disappeared that attacker... I keep checking and check the permissions of /tmp and scan in Immunify and maldetect.

Thanks
 
Back
Top