hybinet wrote:
Tamerax wrote:
is there anyway to help isolate which possible wordpress site is effected so i can patch it up first before getting to the other sites?
I assume there's nothing suspicious in the web server logs? Well, here's a really simple method if you're okay with some downtime. Disable your virtual hosts one by one, for about 15 minutes each, or long enough for any difference to show up in your dashboard. If the bandwidth suddenly drops, you'll know that you just disabled the affected site.
It will be more difficult to tell, however, if more than one site is affected. You said that you found extra .htaccess files in each vhost. So the attacker definitely had access to every site at some point. (You're not using anything fancy like suexec to separate the privileges, are you? That would have contained the damage to one site.)
I found one php file that was definitely not supposed to be there and i got rid of it on friday. I'm not using suexec and yeah, there was an extra htaccess file in each directory redirecting to some russian sites (which is how I found out it was the timthumb exploit).
I would try diabling each vhost but the spikes never happen at any regular interval. Like today, it only happened once at around 6pm. So I can't really turn everything off and wait cause that could mean days of downtime for those sites.
