[snarfed]evidently my web site got broken into. 😐 looks like they didn’t get too far, but still. anyone familiar with wordpress forensics and clean-up post-compromise?
[snarfed]i have the full HTTP request logs from the IP that broke in. the first POST requests were to `wp-admin/admin-ajax.php`, so that’s not too helpful
[snarfed]site is safe for now, wordpress is entirely disabled, it’s serving only from static file cache. gotta run for now, but thank you for looking GWG! i’ll be back in a bit
[chrisbergr][snarfed] I'm sure your security plugin would have already triggered the alarm, but just to be on the safe side, search all your files for the occurrence 'api.telegram.org'. I have experienced problems with that on many WP installations in the last weeks.
[snarfed]> I find it helpful to remind myself that the site I’m working on was probably hacked as a part of an automated process. Unless you’re running a really big site or are particularly unlucky, the hackers who messed up your site came across it as a result of scanning thousands and thousands of sites for a particular attack method.
[snarfed]> Also, while the malicious code is frequently very clever, it’s also frequently very sloppy, and rarely tailored to any particular site. So when you’re scratching your head asking yourself, “what were they thinking??” — remember that the answer is that they weren’t really thinking about your site at all in particular.
[chrisbergr]Yes, I mean look at the access logs, how many times 'someone' tries to login to the wp-admin... On the first sight this seems like a pretty good guide, I'll bookmark this and see if I can get something out of it for myself, later.