The way to restoration eval(base64_decode()) Hypertext Preprocessor Hack in WordPress [Guide]


Whilst a trusted internet site is being redirected to an attack internet site, its manner the website is hacked and the hacker has changed some Hypertext Preprocessor scripts to create the automatic redirection. Starting with the six-step manual on cleaning personal homepage eval(base64_decode()) hack from a WordPress website. Let’s fix wordpress redirection hack now.

What is eval base64 decode hack?

This is a code execution that is obfuscated by a base64 encoding scheme, the only purpose this would be a gift is to hide malicious code. An eval base64 is a PHP feature of hacked code which is used by hackers to gain control over your website. This code isn’t hard to remove manually from all of Hypertext Preprocessor written files, however, what if the all of the WordPress websites were given inflamed via the malicious code once more! We want to apprehend the primary reason for the malicious code injection. After investigating, we found the motives in the back of the hacking of WordPress websites the use of eval base64 decode, listed under:

  • Type of web hosting you use (committed, shared, virtual).
  • Running a previous version of WordPress.
  • Compromise of your FTP/ssh/web console/and many others account along with your company. in case you ever ship your password thru an unencrypted protocol (like FTP), stop doing that.
  • Vulnerable admin account takes advantage of.
  • Putting in outdated themes which use vintage personal homepage scripts.
  • Loopholes inside the code written.
  • Is all software, for instance, Is Apache HTTP Server up to date?
  • Old and susceptible variations of issues.

What does the eval base64 decode code do?

In case your personal home page files are being injected by way of eval base64 decode code line, the users coming from distinct search engines like Bing, Firefox, yahoo, Chrome etc. could be robotically redirected to a malicious internet site. This is what an “eval(base64_decode(“someObscureCharacterString”));” can do.

How does it work?

Once you submit your website in online WordPress Base64 Hack Cleanup tool, it carefully analyzes all the documents to your WordPress internet site for any malicious code.

A way to perform WordPress eval base64 hack cleanup?

A good way to perform base64 hack cleanup on a WordPress website, follow these steps as stated:

STEP 1 – Make certain you continually live up-to-date with the new releases of WordPress variations

STEP 2 – Before you update your WordPress version, we strongly advise you to preserve a backup of all php documents can use this PHP Backup utility. For that reason, move all of your files to a backup folder and then create a backup tarball.

STEP 3 – You could use TextCrawler to look

“eval(base64_decode(“someObscureCharacterString”));” and replaced it with the exact code. Now you could compress the files to a zipper report again, and add it to the internet site and extract. this is one of the only approaches to restore this personal home page infected code.

STEP 4 – Ignoring a WordPress update may also bring about a MySQL injection assault that executes the Hypertext Preprocessor script: to be able to avoid any MySQL attack, you can use “WordPress-MySql-question” which show all the MySQL tables as HTML. As a result, when you may update the WordPress model, you may be prompted to improve the database.

The way to prevent this hack from reoccurring?

Here are the steps on the way to save you your website from reoccurring of eval base64 decode characteristic call:

  • Try to pay more for committed or digital-committed web hosting. Less people the usage of the server approach less vectors to assault.
  • Audit your very own code. If you aren’t experienced sufficient, you can locate someone after which pay for it.
  • Keep your own third-party packages/libraries up to date. Get on their mailing list, RSS feeds, or whatever to live updated with their releases.
  • Make sure you virtually accept as true with the security of your host. Ask them how quickly they patch their offerings in case of net vulnerabilities pop out.
  • Keep your site in model manipulate like git or subversion. Hold your manufacturing directory as a working reproduction so you can easily locate adjustments out of your code base but make sure to block get admission to metadata like. git and .svn dirs.

Tips for Staying safe inside the destiny to preserve your WordPress updated with new edition releases.

  1. Earlier than downloading and installing a plugin, don’t forget about to look into its opinions and number of energetic downloads it has; the more lively installations it has, the greater cozy plugin is.
  2. Only run WordPress plugins that you absolutely want and keep them updated as properly, as most vulnerabilities come from old WordPress plugins.
  3. Usually, maintain your WordPress center files and your WordPress plugins updated. in case you’re prompted to put in an replace to your WordPress dashboard, it’s pleasant to do it at once.
  4. Additionally, allow the notifications for updates to the WordPress subject matters, plugins and properly as WordPress versions. the sooner, the higher.
  5. Deploy an SSL certificate and continually use SSL when logging into your WordPress Dashboard.
  6. Keep regular backups of the complete website content which include documents, media, and other database folders. Make certain you hold a weekly and a month-to-month backup.
Mark Funk
Mark Funk is an experienced information security specialist who works with enterprises to mature and improve their enterprise security programs. Previously, he worked as a security news reporter.