Hello,
I’ve purchased a WordPress theme. The theme is full of bugs, i’ve contacted the developer and gave him access to the backend of my wp with administrator rules and now i get only suspicious activity from them. This looks like a lawsuit. Please restrict their activity and don’t let hackers sell their stuff here, here are the logs on my server after i gave them access to the backend:
lfd on cpanel2.gmb.ro: Suspicious process running under user
seavieweforie
Time: Thu Jun 8 08:12:43 2023 +0300
PID: 984436 (Parent PID:940074)
Account: seavieweforie
Uptime: 75 seconds
Executable:
/opt/alt/php72/usr/bin/lsphp
Command Line (often faked in exploits):
lsphp:/home3/seavieweforie/public_html/index.php
Network connections by the process (if any):
tcp: [redacted ip]:39798 -> [redacted ip]:443
Files open by the process (if any):
/dev/null
/var/log/apache2/stderr.log
/var/log/apache2/stderr.log
/dev/null
/opt/imunify360/proactive/dangerlist
/usr/share/i360-php-opts/sigs/7.5/.rules.v2
/usr/share/i360-php-opts/pd_v1.hdb
/usr/share/i360-php-opts/pd-combined-compiled
Memory maps by the process (if any):
00400000-009cd000 r-xp 00000000 fd:03 42009353
/opt/alt/php72/usr/bin/lsphp
00bcc000-00c51000 r--p 005cc000 fd:03 42009353
/opt/alt/php72/usr/bin/lsphp
00c51000-00c6e000 rw-p 00651000 fd:03 42009353
/opt/alt/php72/usr/bin/lsphp
00c6e000-00c8c000 rw-p 00000000 00:00 0
00fda000-01205000 rw-p 00000000 00:00 0
[heap]
01205000-013e3000 rw-p 00000000 00:00 0
[heap]
7f3256a00000-7f3259480000 rw-p 00000000 00:00 0
7f3259600000-7f325bc00000 rw-p 00000000 00:00 0
7f325bd37000-7f325bdb7000 rwxp 00000000 00:00 0
7f325bdb7000-7f325cc00000 rw-p 00000000 00:00 0
7f325cc00000-7f325ce00000 rw-p 00000000 00:00 0
7f325ce08000-7f325ce18000 rwxp 00000000 00:00 0
7f325ce18000-7f325d05e000 r--p 00000000 fd:05 41945110
/usr/share/i360-php-opts/sigs/7.5/.rules.v2
7f325d05e000-7f325d0de000 rw-p 00000000 00:00 0
7f325d0de000-7f325d296000 r--s 00000000 fd:0d 25167625
/var/db/nscd/hosts
7f3269534000-7f3269584000 rwxp 00000000 00:00 0
7f3269584000-7f32695b9000 r--s 00000000 fd:0d 25167623
/var/db/nscd/passwd
7f32695b9000-7f3269602000 rw-p 00000000 00:00 0
7f3269603000-7f3269627000 r--p 00000000 fd:05 126101606
/usr/share/i360-php-opts/pd_v1.hdb
7f3269627000-7f326967e000 rw-p 00000000 00:00 0
7f3269687000-7f3269688000 rw-s 00000000 00:01 3846521482
/dev/zero (deleted)
7f3269688000-7f326968e000 rw-p 00000000 00:00 0
7f326968e000-7f326969d000 r--p 00000000 fd:05 75500653
/usr/lib64/libgmp.so.10.3.2
7f326969d000-7f326970e000 r-xp 0000f000 fd:05 75500653
/usr/lib64/libgmp.so.10.3.2
7f326970e000-7f3269725000 r--p 00080000 fd:05 75500653
/usr/lib64/libgmp.so.10.3.2
7f3269725000-7f3269727000 r--p 00096000 fd:05 75500653
/usr/lib64/libgmp.so.10.3.2
7f326972d000-7f326972f000 rw-p 0002e000 fd:05 75500537
/lib64/ld-2.28.so
7fff7ac48000-7fff7ac69000 rw-p 00000000 00:00 0
[stack]
7fff7ad8f000-7fff7ad93000 r--p 00000000 00:00 0
[vvar]
7fff7ad93000-7fff7ad95000 r-xp 00000000 00:00 0
[vdso]
ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0
[vsyscall]