So I took a few shortcuts when programming some custom functionality for one of my websites and it came back to bite me in the ass. A phishing page with 8+ files was created on my FTP server. I am assuming that it is the additions I made and not a vulnerability with WordPress. I just thought I would share the hilarious page that the attacker has created on my server and maybe show people an example of what to look for. It is a bit of a headache because I have to go through all my SQL queries and add mysql_real_escape_string() everywhere. The injection added a folder with files in this directory: %%mywebsite%% .com/works/construction Here is the professionally designed phishing "landing page": Edit: Image won't embed well. Here is the link to the full-sized beauty: http://i.imgur.com/CKUFUsl.jpg I mean really though.. Did a 5 year-old make this? Please note the poorly sized background (tiles on my 27" monitor) with a watermark from some image optimizing website. Just beautiful. If this fools anyone then I have nothing to say. All of the images are warped and it is just terrible in every way. I didn't try and click on anything. I am going to download and backup the cancerous files to take a look at them later. Google was actually nice enough to let me know about the incident. They sent me this email: Subject: Code: Phishing notification regarding %%mywebsite%%.com Body: Code: Dear site owner or webmaster of %%mywebsite%%.com We recently discovered that some pages on your site look like a possible phishing attack, in which users are encouraged to give up sensitive information such as login credentials or banking information. We have removed the suspicious URLs from Google.com search results and have begun showing a warning page to users who visit these URLs in certain browsers that receive anti-phishing data from Google. Below are one or more example URLs on your site which may be part of a phishing attack: %%mywebsite%% .com/works/construction/ Here is a link to a sample warning page: http://www.google.com/interstitial?url=http%3A//%%mywebsite%%.com/works/construction/ We strongly encourage you to investigate this immediately to protect users who are being directed to a suspected phishing attack being hosted on your web site. Although some sites intentionally host such attacks, in many cases the webmaster is unaware because: 1) the site was compromised 2) the site doesn't monitor for malicious user-contributed content If your site was compromised, it's important to not only remove the content involved in the phishing attack, but to also identify and fix the vulnerability that enabled such content to be placed on your site. We suggest contacting your hosting provider if you are unsure of how to proceed. Once you've secured your site, and removed the content involved in the suspected phishing attack, or if you believe we have made an error and this is not actually a phishing attack, you can request that the warning be removed by visiting http://www.google.com/safebrowsing/report_error/?tpl=emailer and reporting an "incorrect forgery alert." We will review this request and take the appropriate actions. Sincerely, Google Search Quality Team Note: if you have an account in Google's Webmaster Tools, you can verify the authenticity of this message by logging into https://www.google.com/webmasters/tools/siteoverview and going to the Message Center, where a warning will appear shortly. Conclusion: So this will absolutely teach me to be more safe in the future when dealing with SQL. It could have been much worse. The website is not de-indexed but I'm sure that it has taken a hit in search engine results (although this site receives almost solely Social Media traffic). Perhaps this may enlighten a few people to the dangers of unprotected SQL queries and to be wary of new folders that have been created without your knowledge. At least you hopefully got a laugh from the high caliber landing page.