JAY Wordpress, but it was clean.
After performing an analysis with wordference I located the virus in many folders outside wordpress installation.
That means the attack had exceptional privileges even to broke Centos security and perform inside DDos attacks.
Wordpress virus normally attacks files, rights, databases... First time in my life I see such Hacking insertion into the system.
That's why I make in doubt aapanel security. And absolutelly need an antivirus that runs on the base system and supervise all user's/client's (aapanel user) actions. Even if a visitor access into wordpress and try to perform a direct DDos ttack or try to inject into PHP.
Which solution do you prupose? Is it possible to set Clamav as an active antivirus that supervise every action into the server? Or it is limited to manual periodic/scheduled analysis?
Thank you very much.