Due to the security of Wordpress being compromised, I'll be migrating the blog content to a custom platform.
The main site may appear as a blank page periodically until the issue is resolved.
If you're encountering the eval(gzinflate(base64_decode())) issue in wordpress, here's a great article to help you in your struggle:
https://www.gregfreeman.org/2013/steps-to-take-when-you-know-your-php-site-has-been-hacked/
Thanks Greg!
And if you're feeling bold, this article has the command to remove all occurrences of the offending injected script:
https://devilsworkshop.org/remove-evalbase64decode-malicious-code-grep-sed-commands-files-linux-server/
The solution does require basic knowledge of unix commands & shell access to your hosting account (or a linux environment to run the commands on before re-upload)
Thankfully, I am using a version control system on most of the site files & it is relatively simple to correct any files that are maliciously modified. If you are having the same issue, I highly recommend you look in to using Git or some other system to be able to compare the history of your source files.

Similar Posts