How to scan CryptoPHP malware online?

Scan free your website against CryptoPHP malware!

There is an easy  and simple way to review your website which is infected this malicious script , you can use our online free scanner by entering your URL into related field and click the scan. it shows the status of your website and you can make sure the website is clean or not!

Using our scanner click here or use address ( http://scan.cryptophp.com ).

How to clear/remove CryptoPHP PHP malware ?

Removing CryptoPHP malware!

If CryptoPHP has been found we recommend the following steps:

Remove the “include” of the backdoor. For example, find the script that contains: “”. Note that this path can vary.
Remove the backdoor (social*.png) itself by deleting it.
Check your database to see if any extra administrator accounts were added and remove them
Reset the credentials of your own CMS account and other administrators (they were most likely compromised)
The steps above should be sufficient to remove the impact CryptoPHP has had on your website. We do however recommend performing a complete reinstall of your CMS since the system integrity may have been compromised. An attacker may have gained system wide access for example.
For both security and legal reasons we would advise not to install this kind of pirated (nulled) content.

Reference: http://fox-it.com

What is CryptoPHP ?

Over 23,000 Web servers infected with CryptoPHP backdoor!

Over 23,000 Web servers were infected with a backdoor called CryptoPHP that’s bundled with pirated themes and plug-ins for popular content management systems.

CryptoPHP is a malicious script that provides remote attackers with the ability to execute rogue code on Web servers and to inject malicious content into websites that are hosted on them.

According to Dutch security firm Fox-IT, which published a report about the threat last week, the backdoor is used primarily for black hat search engine optimization (BHSEO), an operation that involves injecting rogue keywords and pages into compromised sites to hijack their search engine rankings and push malicious content higher up in search results.

Unlike most website backdoors, CryptoPHP is not installed by exploiting vulnerabilities. Instead attackers distribute pirated versions of commercial plug-ins and themes for Joomla, WordPress and Drupal through several sites and wait for webmasters to download and install them on their own websites. Those pirated plug-ins and themes have the CryptoPHP backdoor embedded into them.

Web servers infected with CryptoPHP act as a botnet. They connect to command-and-control servers operated by the attackers using an encrypted communication channel and listen for commands.

With help from the Dutch government’s National Cyber Security Center and the Abuse.ch, Shadowserver Foundation and Spamhaus cybercrime fighting organizations, Fox-IT took control of the CryptoPHP command-and-control domains and directed them to servers under its control to gather statistics—an operation known as sinkholing.

“In total 23,693 unique IP addresses connected to the sinkholes,” Fox-IT’s researchers said Wednesday in a blog post. However, the number of affected websites is likely higher, because some of those IP addresses correspond to shared Web hosting servers that have more than one infected sites.

The top five countries for CryptoPHP infections were the U.S. (8,657 IP addresses), Germany (2,877 IP addresses), France (1,231 IP addresses), the Netherlands (1,008 IP addresses) and Turkey (749 IP addresses).

Since Fox-IT published its CryptoPHP report last week, attackers took down the websites that hosted the rogue plug-ins and themes and set up new ones. They also pushed out a new version of the backdoor, possibly in an attempt to evade detection.

The Fox-IT researchers released two Python scripts on GitHub that webmasters can use to scan servers and sites for CryptoPHP infections. They also provided removal instructions in their blog post, but noted that ultimately it’s best toreinstall an affected content management system completely since its integrity may have been compromised.

Reference: http://www.pcworld.com