Having your business interrupted by hacking is very stressful. It’s even worse when you one realize this when Google or other search engine require additional action to access your shop, ‘access at your own risk’.
- Remove old FTP accounts
- Change ALL FTP passwords
Check File Permissions:
Optimum Permissions for most content management systems. These are the recommended settings for PrestaShop (really for any Content Management System ‘CMS’).
- Folders 755
- Files 644
- .httaccess 664
TIP: If you have difficulty verifying all your shop folders/files contact your hosting company. They should be able to provide this information for you.
You must solve shop folder/filer permissions before continuing.
Identifying Corrupted Files
Check Shop Files with Antivirus
Preparation: Up to date high quality antivirus program running on your local computer.
Take away: a list of any files and their file paths detected by antivirus software. We will learn how to replace these later with good files.
There are two approaches depending on your internet speed and hosting control panel.
- Connect via FTP and download your shop files. Your anti-virus program should be monitoring these and identify and isolate files. Make note of files and their file paths identified by your antivirus.
- Non-FTP (download from hosting) to local folder. If your anti-virus program does not auto detect corrupted files then open anti-virus program and run against that folder.
Ok, hopefully using antivirus program on your local computer you have a list of files and their file path that are known to be harmful.
Replacing Corrupted Files
For native PrestaShop files download and unzip files for your version here. For 3rd party modules and themes you will need either the original source files.
Replace corrupted files.
Having had my PrestaShop hacked in 2013 I wanted a way to know if my shop files had been modified without my permission.
This promoted me to write PrestaVault Malware | Trojan | Virus Protection Protects and monitors your mission critical PrestaShop files. Quickly detect and remove unauthorized changes..
If detected change was not authorized you can restore file the module file repository.