Due to a violation of the site rules by the author CXEMA2025, we are disabling their account and removing all their modules from sale.
→Best-selling templates and extensions in April 2025: sitemap, product filter, landing page builder
→New arrivals for April 2025: same manufacturer products, Yandex Split, info block on the product page
→Author: halfhope
This article presents a step-by-step algorithm for removing viruses from an OpenCart-based website. This guide is best suited for technically skilled users who have a strong understanding of coding and can effectively utilize various tools to troubleshoot issues. Even if you are using another CMS or platform, the information provided here may still be useful.
If you need help cleaning your website or server, contact me via Telegram (halfhope). I will provide you with details about the cost and timeline. The cleaning service includes a 1-year warranty.
If anything is missed, set up monitoring:
The recommended monitoring period is 3-4 weeks.
Preparation
To download the site files and database to your local computer, the easiest way is to create a single zip archive. The image
folder can be excluded since it contains images and no executable files. However, you should check it later before uploading the cleaned version of the site.
Use OpenServer/WAMP/LAMP/XAMPP or similar tools to create a new database and import the site’s database dump.
Extract the files into a folder that is convenient for your work.
Working with the Database
oc_user
table and delete all users except the administrator. It is recommended to change the administrator username to protect the account from password guessing attempts.oc_user
table with the MD5 hash of the new password and clear the salt
field.oc_modification
table, which stores module modifiers. Check the modifier code for vulnerabilities, as some botnets since 2020 have used OpenCart modifiers for reverse shell connections.Working with Files
system/storage/modification
).$_POST
, $_GET
, $_COOKIE
, and hidden scripts.Create a zip archive of the cleaned files.
Working on the Server
image
folder and the stub. Delete all non-image files from the image
folder.Note that modern botnets can "hide" after file deletion. Extend the monitoring period to detect reinfections promptly.
General Recommendations
For OpenCart, I recommend the FSMonitor module, which tracks new, modified, and deleted files. It can be set up for automatic execution via Cron and send notifications about changes. You can also manually review files altered by contractors. Download the module here.