![]() |
Javascript Hack?
A injected Javascript hack or bad ad is redirecting my traffic to http://filestore72.info - Is there away to stop this from happening, I have vbulletin 4.2.5
|
Yes, you will need to locate & remove the code they added, most likely a plugin.
You'll also need to try & track down how they injected it, apache logs may help you there. |
This infection is pretty common, they infect your datastore, usually a few .php files on the server and sometimes create a new hook that contains a backdoor.
Remove it, then clear the system cache so the datastore is cleared. |
Your site got malware and you need to check your script carefully + a fresh install for it.
You can contact this guy https://forumweb.hosting/members/bountysite.14470/ he could help you to clean your site. |
All times are GMT. The time now is 02:54 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|