Be crefull there is a hacker ho try to hack the "super checkout module" through vulnerabilities with php:
1- Try to check your logs, you must retrieve a user agent called "python"
2- Check your module files through ftp
- Files/path witch he try to access:
?fc=module&module=supercheckout&controller=supercheckout&ajax=1&method=SaveFilesCustomField
and
/modules/supercheckout/views/img/upload/1709889405_2024x2024x_xsamxadoo.php.php
=> Examine any file that you are unsure of, and look for code changes to existing files, especially php files.
1- Try to check your logs, you must retrieve a user agent called "python"
2- Check your module files through ftp
- Files/path witch he try to access:
?fc=module&module=supercheckout&controller=supercheckout&ajax=1&method=SaveFilesCustomField
and
/modules/supercheckout/views/img/upload/1709889405_2024x2024x_xsamxadoo.php.php
=> Examine any file that you are unsure of, and look for code changes to existing files, especially php files.