Answer the question
In order to leave comments, you need to log in
How to find a virus that redirects to other sites with 1C Bitrix?
About a year ago, we encountered a problem - customers of an online store accessing from mobile devices and specifically from a mobile network (not WiFi), instead of our pages, got to the site on various advertising sites, including even 18+ content. You understand that customers are dissatisfied, reputation is deteriorating, search engines are downgrading in search results, imposing temporary blocks, and also marking us as a site that threatens the user's security - "The site may threaten the user's security, or violations of the rules of the search engine have been found on it. The presence of this problem is negative affects the position of the site in the search results.
We were able to find only "tails" that redirect to various sites, but the root of the problem, which generates such files, was not found.
The site works on CMS 1C-Bitrix, all security recommendations have been observed, user rights are delineated as it should, in general, everything that is recommended in such situations has been done.
How to detect this root, maybe you can trace the access to the PHP file from the logs, or something like that. In general, tell me how to deal with this. Or maybe someone can help personally.
Answer the question
In order to leave comments, you need to log in
For express scanning I use the free version
https://www.imunify360.com/antivirus
and then we will develop a log in feedback for analysis and elimination
, there is also an ai-bolit scanner, but it is more paranoid, swears at everything
But this is usually not enough , you also need to find out how the malware got in.
From experience, I’ll say that (almost) all malware uses the function eval
bundled with. base64_encode
If Git is used in development, then it git status
will help you.
PS: is https enabled?
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question