How To Remove piterreceiver.ga Malware

If you’re researching on how to clean piterreceiver.ga malware, you may consider our free site check.

Need help? Let us clean your site.

Related guides > How to remove trick.trainresistor.cc malware.

If your Google Ads are currently suspended we recommend our Platinum plan, which will include malware cleanup and Ads support:
https://www.magefix.com/platinum/

This contamination may affect both database and web files, so I would recommend to:
a) Check other sites hosted on the same hosting account.
If malware infection is widespread, each site should be isolated, to prevent cross-site contamination.
b) Perform a site cleanup for each WordPress instance, checking plugins, theme and core files.

To fix a hacked website, follow these steps:

Step 1
Backup
1. Backup database and web files using a file manager too, FTP clinet or ask your web host.
2. Disable MySQL remote access, especially if you’re using Plesk.

Step 2
Clean local files
Perform a cleanup for all *.php and *.js files.
Look for “String.fromCharCode”, “piterreceiver”, and “store.piterreceiver.ga”.

Insert the following script inside pack.php file and place it inside your root folder. This way you can pack all PHP and JS files, which can be cleaned locally.

Search and replace tools for malicious strings inside multiple files: dnGrep, grepWin, VisualGrep, PowerGREP.

Step 3
Database check
  • As a precaution measure, look for “piterreceiver”, “String.fromCharCode”. This way you will know if other tables are infected as well.
    Injections usually target wp_posts and wp_options tables.
    The following SQL commands may be used to clear any malicious JS:
  • Search and replace database tool for malicious strings: Better Search Replace, Search Replace DB ver. 4.

  • Check users with administrator privileges.
Step 4
Blacklist status & Google cache
Site should be verified with Google search console. To refresh indexed pages, ask for a re-index.
This way, any infected cached pages listed on Google will be updated.

Step 5
Cross-site contamination
If you’re using a shared hosting account for multiple websites, all index.php and JS files may be infected.
Make sure other sites hosted on the server are secured and isolated.

Notes
WP DSGVO Tools (GDPR)
If you’re using WP DSGVO Tools (GDPR) plugin, you may disable the plugin since there are many security issues reported.
More info: https://wordpress.org/support/plugin/shapepress-dsgvo/
Safe plugin version: https://downloads.wordpress.org/plugin/shapepress-dsgvo.3.1.23.zip

Make sure the following table entry is cleaned ‘sp_dsgvo_integration_matomo’.

Try our Free site check.

Malicious URLs:
https://store.piterreceiver.ga/jsa/trim.js
https://steam.piterreceiver.ga/pm.php
https://storage.piterreceiver.ga
https://store.piterreceiver.ga/track/go.php
https://store.piterreceiver.ga/gateway.php
https://white.belonnanotservice.ga/jpGvcN
https://dreamjunior.best/w_40.js
https://carlsponsors.best
https://serch26.biz/sw/w1s.js
https://store.piterreceiver.ga/Ld5WGw
https://small.piterreceiver.ga/team.php?id=685486-44-334u87-234
https://blink.piterreceiver.ga/slow.php
https://left.trainresistor.cc/clear.js

Malicious domains: trainresistor.cc, piterreceiver.ga, belonnanotservice.ga, dorbluess.bar, cleverysystems.best, drake.monster, demetravertando.best, dorbluess.best, anwapfile.bar, anwapfile.monster, checkrobotics.club, checkrobotics.com, cleverysystems.bar, cleverysystems.best, demetravertando.bar, demetravertando.best, zigmundred.bar, zigmundred.best, keltonchain.bar, fastfuturelist.top, clearyfastexam.best.

Malicious code

Malicious IPs:
80.78.24.100, 188.166.68.96, 134.209.199.15, 185.230.143.101, 45.9.150.63, 109.234.33.9, 45.9.150.64 ( Nice IT Services )

illustration by @Dom J.