We recently discovered tap.digestcolect.com SPAM/virus to have infected our client’s website. And, after understanding it and removing it, we felt the need to share the how works with our readers too.
Symptoms of this tap.digestcolect.com SPAM in WordPress:
- You are often being redicted to https://tap.digestcolect.com/r.php?id=0 URL or to your website’s admin panel.
- This spam works even without any suspicious codes on the wp-config.php or index.php files.
The below-mentioned spam removal method will only work if you have any one of the below-mentioned cases:
- For those of you using the Astra Themes specifically,we’d request you to check your plugins folder that has astra-sites plugin installed.
- Check your database options table, for instance, check if your site_url option has the following urls “https://js.digestcolect.com/dlcc.js?” or “https://js.digestcolect.com/dlcc?” or both.
Category of this WordPress tap.digestcolect.com SPAM:
Usually credited under WordPress redirect spams or WordPress redirect hacks, The tap.digestcolect.com SPAMis used to redirect traffic to other websites. Advertisement revenue is the main source of income for these hackers. Consequently, since advertisers need traffic on their websites to generate revenue, they hire hackers/spammers to generate traffic using these kinds of methods.
But, one positive aspect of the spam is that in 99% of cases your website’s content is safe because their primary target is to drive your consumer traffic to their website. Meaning, these hackers just do it to earn money and do not harm your digital space or ruin your digital reputation.
It is quite hard to figure out the problem without a wordpress security developer on your team. It took us two hours to completely audit the WordPress site.Consequently, we performed two quick fixes to get the site back-up and running again.
How to remove it tap.digestcolect.com SPAM
Step 1. Login to your database, in the options tables, change these two options to your original domain.
https://js.digestcolect.com/dlcc.js? to yourdomain.com
https://js.digestcolect.com/dlcc? to yourdomain.com
Step 2. Remove all astra-sites plugin from the frontend_skin/plugins folder. As the hackers are targeting the plugins are in the folder.
Step 3. Rename your cache plugin if you are using any. Thus, it disables your cache plugin and your website is back-up and running again.
The WordPress security team at NexGen Innovators recommends you to remove it because it exposes the server configuration while importing your theme.
It may be also possible that the spammer has selected some other weak plugin of your website. So, this option might not work for you. In that case you can contact to our WordPress Security Experts to audit your complete website.