If your site has already been compromised it's not sufficient to simply install Admin Tools. It can't protect you if your attacker has already installed a back door to your site. Remember, Admin Tools is the bouncer at the door. If the bad guys are already in, there's no point in having a bouncer. Our plan is find them, kick 'em out and make sure they aren't coming back on our watch. Are you with me?
The first course of action is
unhacking your site. The link points to a comprehensive guide. While unhacking your site I
strongly suggest putting
all compromised sites in Emergency Off-Line mode using Admin Tools. The reasoning behind this is complicated, so you might find
a story about the incident inspiring this advice entertaining as well as informative. By now you should have realised that in such an elaborate hacking condition the only way to ensure that one compromised site won't be used to hack the other ones is making sure that the other sites are not accessible. That's what the Emergency Off-Line feature if Admin Tools is designed to do.
The next step is tightening your security. The unhacking walkthrough contains some solid advice: make sure everything is clean installed, updated and all files accounted for. It will take a while to do that (or you can pay someone to do it for you - it depends on what you have plenty, time or money). After making sure that your sites are in tip-toe shape you can install and
configure Admin Tools on each site. Don't forget applying the .htaccess Maker. In case it blocks more than it should, just follow
the troubleshooting advice. Please don't try to cut corners by not applying the .htaccess; it might cost you a hack.
Finally, let me note another two below the radar attacks you might suffer, even if you are using any security component.
1. If you have third party scripts, running outside of Joomla!, installed on a site's subdirectory (such as WordPress, phpBB3 and so on) do note that these are not protected by your Joomla! security extension. You have to follow the best security practices for each one of them. If they are compromised your site gets compromised as a whole. By the time the attacker manages to upload executable code or run SQL queries on your site, you're screwed.
2. Which brings me to the next point. If a site is hacked on a server, you can safely assume that all sites on the server are compromised. It would require a very skilful system administrator to secure a server to prevent that from happening. The problem is that such admins are hard to get, expensive and their solutions do secure the server but have a toll on the ease of use and sometimes on performance. As a result very few hosts perform such security optimisations. On the rest of them (the majority) a hacked site on the server can hack other sites on the server. The best you can do to minimise (but not nullify!) the risk is having all files owned by the FTP, not the Apache, user and use the FTP layer. But remember, this solution can backfire if a hacker infiltrates your site as they will now have your FTP passwords too.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!