Quote:
Originally Posted by mtdew3q
A couple of days ago, my website at 3rdshiftcoder.net got hacked.
|
As far as I can see it ran WordPress?.. How did you determine it was "hacked"? Where was the website located? On some shared hosting server or? Was WordPress itself, its plugins, themes and whatnot kept up to date? Did you retrieve a copy of the code to determine if you could work with a verified clean backup?
Quote:
Originally Posted by mtdew3q
I am wondering, if I visited site when it is full of malware, can the hackers from the hacked site get access to my pc?
|
Generally speaking (since no details have been posted by you sofar) sites running common CMSes like Drupal, Joomla or WordPress are considered low hanging fruit due to the lack of update TLC they get and web site defacement does not automagically mean having or having had (apart from leeched credentials) local access. Also the very nature of browsing the 'net means exposing your browser to all kinds of sources that want you to execute something (Java, Flash, etc) if you let them and if you do it would be in the context of your UID. The more advanced Exploit Kits (EK) you hear about these days hunt can determine the OS in use and will then ship malware tailored for specific OS / browser / plugin versions. Not that it should make us feel safe but they still mainly target Windows and to some extent OS X.
Quote:
Originally Posted by mtdew3q
My keypassx db was 'corrupted'. I don't know if I shut the computer off while that db was open or the hackers did that to my computer.
|
The fact something is corrupt does not automagically means it got "hacked". You do make regular backups, do you?
Quote:
Originally Posted by mtdew3q
I am wondering if I should do a reinstall of my linux os.
|
I wonder if you should investigate properly instead of going for the reinstall reflex...