Yes, it appears so. In my experience the best thing to do is re-upload a fresh WordPress core to ensure that all traces have been squashed.
It happens… If you aren’t already using security plugins I’d recommend Wordfence and BruteProtect to help keep brute force attacks out as well as checking your core WordPress files for changes.
Related Posts:
- Is moving wp-config outside the web root really beneficial?
- Prevent access or auto-delete readme.html, license.txt, wp-config-sample.php
- Generate WordPress salt
- How does the “authentication unique keys and salts” feature work?
- Securing wp-config leads to sensitive information leak on wp-settings
- Is there any point setting the keys and salts in wp-config.php?
- What’s the point of forbidding access to wp-config.php?
- Where to store OAuth 2.0 client id and secret?
- Config file with no Keys..?
- White screen of death on admin pages after moving wp-config up two levels for security
- Storing FTP details in wp-config.php
- My Site keeps crashing due to the wp-confg file being deleted
- Moving wp-config.php outside root folder where we have multiple wordpress websites for enhanced security [duplicate]
- How to change location of wp-config.php to folder or 2 folders up?
- Adding Security Keys?
- Remove hacked code – out of ideas! [closed]
- Secret keys in SCM
- wp-config.php moved above root results in no plugin updates
- wp-config.php file and code injection
- Malware/Permission bug removal?
- Default installation permissions for wp-config.php
- Move data from wp-config to another file
- SSL Error: unable to get local issuer certificate
- When you use ‘badidea’ or ‘thisisunsafe’ to bypass a Chrome certificate/HSTS error, does it only apply for the current site? [closed]
- When you use ‘badidea’ or ‘thisisunsafe’ to bypass a Chrome certificate/HSTS error, does it only apply for the current site? [closed]
- Why does the URL http://a/%%30%30 crash Google Chrome?
- When you use ‘badidea’ or ‘thisisunsafe’ to bypass a Chrome certificate/HSTS error, does it only apply for the current site?
- Can an attacker use inspect element harmfully?
- Where does Internet Explorer store saved passwords?
- What security concerns should I have when setting FS_METHOD to “direct” in wp-config?
- WordPress 4.7.1 REST API still exposing users
- Should I escape wordpress functions like the_title, the_excerpt, the_content
- Why does WordPress need my private ssh key to update?
- When to use esc_html and when to use sanitize_text_field?
- Will there be security updates for 3.1 once 3.2 is released?
- WordPress it’s cleaning a custom query_var to avoid sql injections?
- Can someone explain the use cases of esc_html?
- Tips for finding SPAM links injected into the_content
- Is WordPress vulnerable to the httpoxy?
- wp.getUsersBlogs XMLRPC Brute Force Attack/Vulnerability
- Is there a security risk giving someone temporary access to my blog’s code?
- Is /wp-login.php?redirect_to[] exploitable?
- brute force attack even though it is limited by IP
- What should I do about hacked server?
- How can I tell who changed the password?
- WordPress website Security [closed]
- How do I authenticate WP users from a chrome extension?
- Website is being flooded [closed]
- Is the “lost password” feature truly a vulnerability?
- Is it possible to reduce the minimum character length for passwords?
- Handling email piping attachments and detecting unsupported file types
- Why was my blog post inserted lot’s of ad links by others?
- Auth cookie value security risk?
- Security – Shortcode injection attack
- Registration Plugin – Recaptcha integration
- Security threat with `home_url`?
- How to combat flooding admin-ajax.php?
- When is wp_set_password() called or how to capture a password
- Moving away from MD5: Where to declare the custom global $wp_hasher?
- Would it be dangerous to send all the wp_options to javascript file?
- Should I disable directory listing for wp-includes?
- How to get WordPress to send Password Reset Link Email instead of New Password?
- Safety side of storing emoji into database
- How can I safely hide the fact that my website runs on WordPress? [closed]
- How can I display nickname instead username in links
- My WordPress Websites are always under attack
- Is there value in using a wp_nonce for POST requests?
- How to hide easy access to my website temporarily?
- Can I Remove xmlrpc.php completely?
- How much should I worry about these messages?
- Security concerns with external links
- Uploading .webm format on WordPress results in security guidline breach and fail
- Any any insecure http:// URLs left in wordpress?
- .htaccess password protection bypassed
- Can a WordPress administrator see other users’ passwords?
- Why my plugins are updating automatically?
- Privilege escalation bugs in 2.9?
- Content-Security-Policy blocks WordPress check boxes from being activated
- Prevent editor from adding script or form
- Finding where a snippet of code is coming from
- wordpress admin security
- Why do people use “admin” username by default? [closed]
- WordPress Database Re-installed (Hacked)
- WordPress Security tools
- Robots.txt file not updating
- Advice On How to Backup WordPress
- How can I stop other plugins from using my class’ sensitive methods?
- What are WordPress Current Security Issues in 2017?
- Password-protect feed and make it usable in major aggregators
- Should I change the default file and folder permissions?
- WordPress exploited theme is causing high io load on server
- How to rewrite rules for WP-security in Nginx?
- how to find the way they hacked my WP site
- How to set custom validation for WordPress Passwords?
- Is it a bad idea to CHMOD 777 all the files on your site?
- is this code properly secured
- nginx + wordpress: Best practices for configuring it to be secure, reliable, and fast? [closed]
- How to get real password (before encrypt) when register a user?
- Heartbleed: What is it and what are options to mitigate it?
- OpenVPN vs. IPsec – Pros and cons, what to use?