What are the next steps to recover from the hack? I was able to get my server running from a backup (lost some data but nothing too bad) but now I feel something more needs to be done.
Can the dev team lay out the steps now that the server data has been exposed? The MySQL root password needs changing, right? What else needs changing? Can the dev team create a full list along with the commands to run?
Thank you but this wasnt the question. I have my server running properly but the passwords etc. are out in the wild. I want to know what stuff we need to change on the server after recovery.
Upgrade to the latest. For me, I think the infected files are still there. Not sure where to remove them. But had removed almost many of them. And I disabled SSH from AWS console as I am using EC2. That fixed from happening it again. Make sure to upgrade, that will fix the exploit.
All my Crons was removed and added the atdb malware. After the upgrade to the latest (2.3.8), it was all restored. Now need to wait till tomorrow to check if the automated Google backups are working or not as they are crucial for emails.