There is a trojan around infecting sites with a encrypted script starting ‚var zaee=“4.5*2,4.5*‘ and iframe src linking to zxstats com and bali-planet com
This script is to find right after the body tag of index.html files and infects the PC of a visitor by loading an .exe file.
This file in return seems to scan infected PCs for ftp login user and passwords.
Finding these for example in filezilla’s passwordmanager in C:\Users\username\AppData\Roaming\FileZilla\sitemanager.xml it will send these ftp usernames and passwords out and try to access the sites stored in this file.
There will be all index, start, home and main files with extension .php or .html infected by an added script.
The problem is the stolen ftp login, not any blog software or CMS running there! Giving ftp passwords out of hand no website software can prevent from changing files!
Sites running on php might not work after infection and show an error instead, like „Parse error: syntax error, unexpected ‚?‘ in /xxx/yyy/public_html/index.php on line 18“ (WordPress) or „Parse error: syntax error, unexpected ‚?‘ in /xxx/yyy/public_html/modules/boonex/chat/home.php on line 38“ (Boonex Dolphin)
Actually lucky for visitors as in this case the script doesn’t run and will not infect their machines. In .php files the script is added after the last ‚?‘ and before the closing ‚>‘ and doesn’t work here.
What to do?
First clean your PC from trojans using any anti virus software (malwarebytes, MS Essentials)
Do not store login passwords in Filezilla Servermanager, if you have it there delete it and set it for ‚Ask for Password‘ to manually typing it.
Change your infected servers ftp password (and do not store in the ftp program!!)
With your new login go to your site and ‚repair‘ all infected files by replacing them with a backup file or editing and removing the malicious code – that’s the biggest task ..