Two things. We cannot edit anything through our backend in Wordpress site. We can successfully log in but it seems our index File is corrupted and will need to be rebuilt it also appears to be Japanese malware so we will need someone to clean the site and update the index file so it is working correctly so we can successfully edit products in our backend.
Our code is written in Russian
For concern when searching for the site and Japanese malware/code appears to load, this would be do to a well known exploit that Google has documentation for. The easiest way to over come this concern would be to get the site re-index as this will allow Google to see that the site is no longer compromised. Here are some suggestions as to what you can do to help resolve this issue including a link to Google and how they recommend resolving this issue...
[login to view URL]
1) Find the site causing the issue and enter the document root
NOTE: Some cPanel accounts may have more then one document root that has been compromised.
2) Remove the "Sitemap" line from the [login to view URL] file (if one exists) and remove any sitemaps not created by you.
NOTE: Some of these xml files may exist in a "sitemap" folder.
3) Remove the rest of the malware and secure the account to help prevent this from happening again. Usually this is due to an out of date WordPress script, theme, plugin or a WordPress password compromise.
NOTE: You may want to have the site professionally cleaned by a security provider.
4) Once that is done, you can go to webmasters tools inside Google and Bing, resubmit new sitemaps and have the site(s) re-crawled to resolve the issue.
Upon further investigating the reason why when attempting to access the admin panel you're experiencing issues would be because of several files for the Wordpress installation being corrupted even after they were restored from our backup dated: Sat May 30 04:52:37 2020. To be more precise this files would be the [login to view URL] which contains code not pertaining to a Wordpress installation, I attempted to create a new file with the correct content yet this did not appear to correct the issue(old file has been renamed to [login to view URL] in case you will like to review it). A second file that contains content that does not belong to a Wordpress installation would be: /home4/teranova/public_html/wp-content/themes/[login to view URL], this are just some of the files that contain this code and are the most noticeable.
41 freelancers are bidding on average $403 for this job
Hello, I can cleanup the malware from your wordpress website and secure the website to prevent more hacking attempts. After the cleanup i will submit for google reconsideration. Let me know when we can start. Thanks