Infected with js.digestcolect.com? Easy fix available

Another wave of malware contamination sparked this week, similar to trackstatisticsss, stivenfernando and resolutiondestin.
So far aprox. 350 sites affected by

Need help? Let us clean your site.

To fix a hacked website, follow these steps:

Step 0
Backup site
1. Backup database and site files. If you can’t do it, ask your web host.
2. Disable SQL remote access, especially if you’re using Plesk.
3. Change SQL user password.

Step 1
Reset site URL
Restore site URL: https://wordpress.org/support/article/changing-the-site-url/.
Easiest way would be to edit wp-config.php file via FTP or hosting dashboard ( replace example.com with your own domain name ).

define( 'WP_HOME', 'http://example.com' );
define( 'WP_SITEURL', 'http://example.com' );
Step 2
Clean local files
All index.php and JS files may be corrupted as well.
Look for “String.fromCharCode”, “mndfhghjf”, “digestcolect” and “list.insertBefore(s, list.childNodes[0])”.
Insert the following script with pack.php file and place it inside your root folder. This way you can pack all PHP and JS files, which can be cleaned locally.

<?php
exec("find . -name '*.php' -o -name '*.js' | tar -cvzf php-js.tar.gz -T -");
phpinfo();
?>

Search and replace tools for malicious strings inside multiple files: dnGrep, grepwin, VisualGrep ( mac ), powergrep ( paid ).
Example of infected JS file:

Step 3
Database check
1. As a precaution measure, look for “digestcolect” then for “String.fromCharCode”. This way you will know if other tables are infected as well.
Attackers usually alter wp_posts and wp_options tables.
2. Check user list, change password for administrators

Step 5
Major update
Perform a major update, making sure core files, theme and plugins are up to date.
Disable any unmaintained abandoned plugins.

Step 5
Blacklist status & Google cache
Lastly, website should be verified with Google search console. A re-index should be performed, in order to refresh cached content.
This will prevent having infected cached pages listed on Google.

More details about this contamination:

Malware is hosted with css.digestcolect.com, js.digestcolect.com. Domains are pointing to an Unified Layer server, 162.241.65.79, using now1.dns.com and now2.dns.com nameservers.
Samples can be found here: https://pastebin.com/sjt9mjKB.

Malicious URLs:
hxxps://css.digestcolect.com/zbt?v84
hxxp://css.digestcolect.com/ghr?v=l/t.js?t=1&
https://js.digestcolect.com/g.js?v=18
https://fox.trackstatisticsss.com/?id=3456679323
https://js.digestcolect.com/dlcc.js
https://tap.digestcolect.com/r.php?id=0
https://css.digestcolect.com/g.js
http://css.digestcolect.com/m.txt
Malicious networks:
88.208.60.53: esmo.pro, slimsk.pro, tiond.pro, vivom.pro, voldt.pro, cmilg.pro, gumk.pro, putop.me, avrm.pro, hkloo.pro, bvideo.pro, limso.pro, norkw.pro, videotu.me, rpket.pro, goplre.pro, tropd.com, formens.pro, vimlo.pro, horkl.pro
62.138.18.107: take-yourprize-here.life, bestprize-places-here.life, your-sex-thirst2.com, newbest-prizebox.life, best-datingclubs1.com, goodzone-forprize.life, check-your-vip-prizes1.life, meet-me-nowhere2.com, takebonus-prizesnow1.life, bestprizesday2.life, get-your-lady-here.com, your-super-dating-here.com, flirtgirlsexx3.com, great-prize-area1.life, getdatinglives1.com, your-sexydreams1.com, your-dating-space2.com, best-prizehouse4.life, adultdating-plan1.com, flirthotsexxx4.com, mega-prize-area5.life
193.35.48.25: congrurts9.live, www.congrurts9.live, deivengs1.live, www.deivengs1.live, doonalermet5.live, www.doonalermet5.live, jsdevelopmentq4.live, www.jsdevelopmentq4.live, www.svgoptimax2.live, svgoptimax2.live, wiethcrt14.live
Malware related to: digestcolect -> trackstatisticsss.com, donaldbackinsky.com, adsforbusines.com, destinyfernandi.com, globallyreinvation.com.

Try our Free site check.