Backdoor: PHP:PREG_REPLACE:EVAL
Description: We detected a malicious code hidden under a preg_replace with the “e” switch that acts as an eval call (code execution). It is often used to bypass simple detection methods that only look for “eval(” call itself.
Use: Hide spam, malware and backdoors.
Affecting: Any web site (often through outdated WordPress, Joomla, vBulletin, osCommerce and stolen passwords).
Clean up: You can also sign up with us and let our team remove the malware for you.
Malware dump:
More information: Backdoor: PHP:PREG_REPLACE:EVAL
Story added 11. March 2012, content source with full text you can find at link above.