Malicious actors are constantly trying to install harmful code on other people's sites. This code is used for activities such as: sending spam, network attacks, further infection of other people's resources. This often happens because of FTP and hosting control panel password theft, as well as vulnerabilities in popular CMS: WordPress, Joomla!, Drupal.
Such activity cybercriminal activity interferes with the normal functioning of both your sites and the sites of other clients. Therefore, the hosting platform automatically scans new files for malicious code several times a day. If the code is detected, measures are automatically taken to remove it, and a corresponding notification of the following form is sent to the client:
FILE HIT LIST:
{HEX}php.base64.v23au.186 :
/var/www/example/data/www/example.com/administrator/modules/xml.php
=> /usr/local/maldetect/quarantine/xml.php.2618924006
{HEX}php.base64.v23au.186 :
/var/www/example/data/www/example.com/administrator/modules/mod_multilangstatus/dir56.php
=> /usr/local/maldetect/quarantine/dir56.php.104017012
{HEX}base64.inject.unclassed.7 : /var/www/example/data/www/example.com/index.php
=>
/usr/local/maldetect/quarantine/index.php.1993330613
{HEX}php.base64.v23au.186 :
/var/www/example/data/www/example.com/components/com_contact/controllers/login.php
=> /usr/local/maldetect/quarantine/login.php.2603530476
{HEX}base64.inject.unclassed.7 :
/var/www/example/data/www/example.com/includes/framework.php
=> /usr/local/maldetect/quarantine/framework.php.260901782