Despite the assurances of the joomla development team, that suggest that, with the upgrading from the cms, this vulnerability has been cleaned, this malware remains active and present. This situation requires a drastic and definitive intervention.
I have repeated this procedure successfully on 3 different websites.
System features of the three websites:
Web Server Apache, PHP Version 5.6.16, 5.5.44-MariaDB, joomla 3.4.8, template Cerulean 1.6
1. Clean the active source of the malware, hidden between the plugins from the joomla CMS.
FTP overwrite all joomla files (except the htaccess.txt and the installation directory = 5407 files) with the original files downloaded from the official website (from the same version)
2. Clean the compromised files in the template structure.Before proceeding with the template reinstallation, ensured you have saved (in your local PC) the edited/customized files.
- FTP overwrite of the complete \libraries\rokcommon\ directory
- Reinstalling of the Cerulean Template with the original files downloaded from the Rockettheme website
I'm sorry but RT do not provide support for third-party products - If you need assistance with Akeeba products then you should ask them for assistance.
I would also add that in your cleasing method you should be removing the files that are not part of the "normal" installation. (i.e. those with the "01" "02" in them. copying files from elsewhere (to overwrite) or reinstalling products is not going to remove these files that contain the malicious code. If you do not delete these files then you will get infected again.
Regards, Mark.
Please search forums before posting. Please make sure your post includes the version of the CMS you are using and a link to the problem. Annotations on screenshots can also be helpful to explain problems/goals. Please use the "secure" tab for confidential information.
So what product did you use to do the clean in the end?
Regards, Mark.
Please search forums before posting. Please make sure your post includes the version of the CMS you are using and a link to the problem. Annotations on screenshots can also be helpful to explain problems/goals. Please use the "secure" tab for confidential information.
No products;... considering what I have about read it in different security forums.It's very strange, some experts have so written, that this code are recognized from only two online scanner, since it is not a virus and is written with a general and normal web syntax.
I used WinMerge and have compared the different structures, focusing on the cms files that are present since 2014 - the year in which it is assumed was the distribution of this code.
Ok - as I suggested then, it was a manual solution. It's just those message you posted made me think that perhaps you had used a tool... but yes I can see it's winmerge now you say.
Regards, Mark.
Please search forums before posting. Please make sure your post includes the version of the CMS you are using and a link to the problem. Annotations on screenshots can also be helpful to explain problems/goals. Please use the "secure" tab for confidential information.