In this article, we will outline a step-by-step algorithm for detecting and removing viruses from a website, as well as provide recommendations for protection and preventing future incidents. By following these instructions, you will not only clean your site but also secure it for the future.
→Personalized templates, File System Monitoring, Extended Schemes, and other modules from the author halfhope are now free.
→The "IMTabs (OC 3)" module allows you to easily create and fill additional tabs for products in OpenCart, including uniform information such as FAQs, with customization and automation options.
→New products for November 2024: SDEK, Sberbank Installment Plan, Simple Reviews.
→Author: halfhope
This article presents a step-by-step algorithm for removing viruses from an OpenCart-based website. This guide is best suited for technically skilled users who have a strong understanding of coding and can effectively utilize various tools to troubleshoot issues. Even if you are using another CMS or platform, the information provided here may still be useful.
If you need help cleaning your website or server, contact me via Telegram (halfhope). I will provide you with details about the cost and timeline. The cleaning service includes a 1-year warranty.
If anything is missed, set up monitoring:
The recommended monitoring period is 3-4 weeks.
Preparation
To download the site files and database to your local computer, the easiest way is to create a single zip archive. The image
folder can be excluded since it contains images and no executable files. However, you should check it later before uploading the cleaned version of the site.
Use OpenServer/WAMP/LAMP/XAMPP or similar tools to create a new database and import the site’s database dump.
Extract the files into a folder that is convenient for your work.
Working with the Database
oc_user
table and delete all users except the administrator. It is recommended to change the administrator username to protect the account from password guessing attempts.oc_user
table with the MD5 hash of the new password and clear the salt
field.oc_modification
table, which stores module modifiers. Check the modifier code for vulnerabilities, as some botnets since 2020 have used OpenCart modifiers for reverse shell connections.Working with Files
system/storage/modification
).$_POST
, $_GET
, $_COOKIE
, and hidden scripts.Create a zip archive of the cleaned files.
Working on the Server
image
folder and the stub. Delete all non-image files from the image
folder.Note that modern botnets can "hide" after file deletion. Extend the monitoring period to detect reinfections promptly.
General Recommendations
For OpenCart, I recommend the FSMonitor module, which tracks new, modified, and deleted files. It can be set up for automatic execution via Cron and send notifications about changes. You can also manually review files altered by contractors. Download the module here.