Beware of WP-Rocket

waikey

Member
Jul 18, 2020
48
-7
8
www.waikey.com
I don't have any nulled plugins at all. But after some searching it was mentioned the "Ultimate Addons for Elementor" was hacked and many websites were infected with this virus.

That's strange now...

I never installed the "Ultimate Addons for Elementor" , and my blog is a paid clean theme based on the “Options Framework”. their is no page builder like the "Elementor" or "Wpbakery", the theme use the classic editor...
 

ChainofChaos

Active member
May 5, 2020
148
55
28
I also use WPRocket and I don't have any issues with it and there's no virus already checked. I hide my plugins so visitors can't see them from inspect element.
 

ali.smartsyed72

Active member
Trusted Uploader
Dec 29, 2018
175
64
28
Pakistan
www.div92.com
Install plugin name quttera web malware scanner and run the internal scanner it will high light the code which is infecting your WP site remove it and your site will be back to you here I would like to add something that I am using babiato from last year and I didn't have any issues like you were saying probably its something else is infecting your site not the wp-rocket plugin
 

dezigna

Member
May 18, 2020
65
25
18
These scans happen all the time...probably bug in revslider and duplicator plugins too.

/wp-admin/admin-ajax.php?action=revslider_show_image&img=..%2Fwp-config.php
/dev/?q=%2Fdev%2F
/tmp/?q=%2Ftmp%2F
/home/?q=%2Fhome%2F
/?q=%2F&action=duplicator_download&file=..%2Fwp-config.php
 

johnyblack

Active member
Aug 10, 2018
122
43
28
Andromeda
guys dont say bull***** please. Babiato is the only CLEANKING here so be carefull with your words. They work hard for that and you press just a button to download. Bitch please..... specially cyberdevil is masternuller
 
  • Like
Reactions: maumaju

obs3rv3r

Member
Sep 6, 2018
38
15
8
thanks for your hardwork!
I don't know how to fix the backddor since I even don't know where is the backdoor~~~ so I post here to remind if someone else got the same problem ! will check the whole site later for more details
well for anyone going through this, i had an issue similar to this backdoor which infected my whole server but i cleaned it up manually it would be tedious so i would advice the plugin wordfence, it would do a scan and then delete all non wordpress file. If you have a good wordpress admin then it can be done manually.

To be honest the file that infected my server then was not from babiato, since i could not find on babiato i went to download out there. well i learnt my lesson, if i cannot find here i would rather get the plugin by buying and uploading here for everyone, i am planning to get a plugin other might need also.

I am not so sure it is a plugin from babiato that infected your site as i have been using wp rocket from babiato and nothing at all.
 

thefuckingdevil

New member
Jul 14, 2020
6
4
3
I got infected 2 sites both had wp rocket one of the sites literally has 2 plugins wp rocket and pretty links (paid) paid themes so i strongly believe is that SOB rocket
 

MrSam_1

Well-known member
Administrative
Trusted Seller
Dec 1, 2018
23,599
26,951
120
  • Like
Reactions: tanierlyons

TassieNZ

Premium Uploader and Sometimes Hacker!
Jan 17, 2019
9,017
19,812
120
New Zealand
This thread is suspicious asf especially since the medium article you reference links to your own blog...

Capture.PNG

Have you any proof that this came from here on Babiato?

@CyberDeviL @Tomz @TassieNZ
I would also like proof. Correct me if I'm wrong, but I thought the offering on Babiato comes from @CyberDeviL and he has a legitimate license!!! Therefore, are the developers adding something? Doubt it!

TassieNZ :)
 

Itsyaboy

Active member
May 9, 2019
209
77
28
I've been using WP-Rocket from babiato on 6 different websites and not a single infection, so either you downloaded a random zip version someone posted within the thread or highly mistaken.
 
  • Love
Reactions: TassieNZ

CyberDeviL

Back to Life 🧬
Trusted Uploader
Aug 10, 2018
2,795
10,823
113
Earth
TO CLARIFY:

FIRST OF ALL, AS PER ABOVE SCREENSHOT, I COULD ONLY SEE ONE RESULT ON GOOGLE RELATED TO "donatelloflowfirstly.ga wp-rocket" AND THAT IS TOO FROM A UNKNOWN "GUEST AUTHOR" HITESH SISARA FROM MEDIUM.COM . . .

REGARDING WP ROCKET NULLED . . . . ALL MY SHARES ARE DIRECTLY FROM DEVELOPER'S SITES (NOT FROM ANY 3RD PARTY SHITS). SO IF YOU FIND ANY sh** FROM MY FILES YOU ARE ELIGIBLE TO ACCUSE THE DEVELOPERS DIRECTLY WITH THAT VALID PROOF.


BUT !!!

I have seen many people having ZERO PATIENCE here too, if some theme/plugin gets delayed to be posted here by mainstream users here, and in between that time if someone (unknown / newbie users) else posts the updated one, people blindly rushes towards that release to use and grab the unknown DIAMOND. IN SUCH CASE THEY ARE ENTIRELY RESPONSIBLE FOR THEIR HARDCORE STUPIDITY DESPITE THE RESOURCE BEING DOWNLOADED FROM BABIATO.

@medw1311 @TassieNZ I already stated on people's acts these days :p :ROFLMAO: Even one different GPL website author posts WP Rocket here too, so who know from where they grabbed shits.
 

CyberDeviL

Back to Life 🧬
Trusted Uploader
Aug 10, 2018
2,795
10,823
113
Earth
Yep I think they are full of sh*t. If wp-rocket had a real problem we would have heard about it by now.

I don't care about dumb people's complaints . . .

I had been sharing XenForo releases from my own purchased . . One day one guy complained here that HE DOWNLOADED XENFORO OF MY RELEASE FROM BABIATO AND HAVING FILE HASHING MISMATCH ISSUE . . I asked him IF HE WAS SURE IT WAS FROM MY RELEASES . . HE SAID "YES" . . . Then I checked his SOURCE and it was linked with another XENFORO NULLED SITE . . .

So, what should I expect from such people :unsure: :sneaky::poop::poop::poop:
 

pcintav

Active member
Oct 8, 2018
214
102
43
It's been a few days, the discussion is still not finished. In my opinion, who have created hundreds of wordpress-based websites, this problem is actually quite simple to solve. Here are what I usually do:
Make sure before doing the steps below, to disable the website from being accessible (so that the malware doesn't create/infect files further), then replace / update the wordpress core, themes and plugins using a really clean resource. . Then...
1. the most basic way, if the website admin can still access the admin back-end, just install Wordfence (as mentioned above) then do a scan. The scan results will show files that are dangerous or suspicious (files that contain backdoor scripts will also be detected). Usually malware files use strange file names or auto generate names. Then delete the file (if the file is not the original file from the developer), OR, edit the core/original file if it has been infected or infiltrated by malicious code (remove the malicious code only). If the contents of the core file have been completely replaced with malicious code by malware, just delete the core file, then upload/update the deleted core file with the original file from the developer.
2. the manual way, check the file permissions of each folder/file, the standard wordpress file permissions for folders is 755 (or 775) and for files is 644, now if the file permissions of a folder (especially files) are 777, then you need to be careful , usually and generally malware has changed it. If the website is infected, I usually just need to see the file permissions of the folder that have changed to 777, then I investigate further into the files in it, then delete or edit it manually, according to the need/damage caused by malware. Change the folder permissions back to 755 and the file to 644.
3. Check your website database!
4. If you use cpanel (file manager), don't forget to activate Show Hidden Files (dotfiles) and check the .wellknown> acme-challenge and cgi-bin folders, usually malware also copies itself into these folders.

NOTE:
1. if you are a website developer who uses resources not from the original source, THEN, don't blame anyone, bear all the consequences and risks to yourself. Fix everything by yourself or find someone who understands.
2. Always check all resources before you install it (even if it comes from the original developer).
3. If you are a shared hosting user, you must be aware that malware is very easy and possible to spread between websites on the shared server. Don't ALWAYS blame the owner or builder of resource files that you have installed on your website. Consult the problem with the hosting company you are currently using.
4. Perform regular scans from the server side and admin back-end.
5. THE IMPORTANT THING IS: make sure you are accompanied by a few cups of coffee :coffee::coffee::coffee:when applying the steps above :ROFLMAO::ROFLMAO:.
 

About us

  • Our community has been around for many years and pride ourselves on offering unbiased, critical discussion among people of all different backgrounds. We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu