/wp-content/updraft/emptydir/admin.php full of malware code, what is this folder created by Updraft doing anyways? and why so easy to add malware inside that folder.
We’ll also extract and copy the public_html/index.php file from the old backup to the server, because the existing one looks weird (it contains a PHP @include directive to include the file /home/username/public_html/wp-content/updraft/emptydir/.684f3ddd.ico using some octal escapes (\nnn) to unnecessarily (they were standard ASCII characters) specify some of the characters in the file name.
is this Updraft’s fault? or some permissions thing that is allowing malware to put files in there as a convenient location sort of like the /wp-content/upgrade/ folder or something???
Author
Posts
Viewing 8 posts - 1 through 8 (of 8 total)
Please Donate
Friends, the time has come for us to ask for your financial support. After 5+ years of (growing) expenses, and taking time away from consulting and services, we must start generating donations in order to continue this level of rapid project development. Please consider donating, so that we can keep SlickStack free and open source. Thank you! 🙏 😍