How to clean malware

This week thousands of WordPress sites are being infected and their visitors redirected to: .
According to publicwww index, there are many sites affected by this recent hack ( aprox. 3778 ).

Need help? Let us clean your site.

Here are some basic steps you should take, in order to sort it out:
1. Perform site backup ( site files and database ).
2. Evaluate if your site is affected by cross-site contamination.
3. Manually set siteurl and home data, using wp-config.php ( after this, you should have restored dashboard access )

define( 'WP_HOME', '' );
define( 'WP_SITEURL', '' );

4. Make sure only authorised users have administrator rights.
5. Update core files, plugins and theme ( important ).
6. Change “home” and “siteurl” using phpMyAdmin or any other database manager.

Optional: change database password, remove FTP accounts which you don’t need, change cPanel login information.

If your WordPress posts are injected with Javascript malware, then you can run this SQL query ( make sure you backup first ):

 UPDATE wp_posts SET post_content = REGEXP_REPLACE(post_content, '<script(.*?)>((.|\n)*?)<\/script>', ''); 

Other reported malicious URLs:

Need help? Let us clean your site.