alana said:
The fixes for the mess this *chap* made were simple,
That can be a very dangerous assumption to make. These "chaps" can be exceedingly cleaver. When I was hacked, they used a php "exploit" in my forum software to upload files that allowed them to gain root access to my server. If they compromised the server, then just removing the obvious files and doing a restore of the forum stuff may not be enough. Very often (usually) they will install some "backdoor" files that look innocent enough but are actually files that they later can use to exploite the server again.
When I was hacked, I had literally hundres of such files, often buried deep in the directory structure, with names like index.htm or "test.htm," or "2.htm". Many of these files were deep inside the directory structure of my Photo Gallery directories and were not obvious "bad" files until I actually viewed them in a text viewer, then it was obvious they were a backdoor files to give teh bad guys access without me knowing it. But they also had managed to get files into my dirs below the public_html dir.
One needs to do a <span style="color: #CC0000">VERY</span> careful review of everything on the server. As root user, you will want to SSH in and look in all the common dirs like /tmp /var/tmp, etc and do ls -alh and ever dir you can find to see if there are any hidden dirs and files there that should not be there. For example, if you go to /var/tmp and do ls-alh and see hidden dirs like .x .y .2 etc, then you have a problem, Houston. Even that is not 100% guaruntee because they often install something called a "root kit" which replaces the "real" Unix commands (like ls) with their own version. So, when you do an LS command or some other like "process" or "top" you are actually running theie files and it will look like everything is normal because "their" ls command hides their activity. Very nasty stuff these rootkits.
It took me 36 hours straight to recover fully when I was hacked. I hope for your sake this was not the case.
Basil