@jac This sounds like quite the horror story, but sadly, all too common.
@jac said in Hardening WordPress - Reducing the attack vector:
rightly or wrongly proceeded to delete my files via FTP .
This part is where I would have (if you knew me then) have stepped in and claimed back access to the site. The database was probably injected with malicious SQL, so wouldn’t be fit for production use, but it’s perfectly possible (and relatively simple) to get access back via a reset of the admin MD5 hashed password in the database itself.
@jac said in Hardening WordPress - Reducing the attack vector:
I’d lost hundreds of news stories I’d written
This is exactly my justification for writing this
https://content.sudonix.com/how-often-do-you-test-your-backups/
@jac said in Hardening WordPress - Reducing the attack vector:
In my mind I’m thinking the best thing to do is to start again, and like a fool I didn’t have a recent backup of my wordpress installation.
This is why it’s of paramount importance to determine, design, configure, and set a backup and recovery strategy - and, as I mentioned in the article above, this needs to be tested periodically to ensure it is actually fit for purpose rather than simply relying on it being functional when you need it.
@jac said in Hardening WordPress - Reducing the attack vector:
I know Mark will go to town and have nightmares of all my rookie mistakes but after reading the blog I do feel a lot more confident if I was to use WordPress again that I’ve learnt a lot of what not to do and to not be too hasty next time.
No, I won’t - really, I’ve seen this so many times, and one of the reasons as to why this platform exists in the first place is to educate, and ideally, eradicate.