Akeeba Backup for Joomla!

#36853 addendum to ticket #36811: Malware found in restore.php

Posted in ‘Akeeba Backup for Joomla!’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
PHP version
Akeeba Backup version


Hello Nicholas,

as I cannot reply on ticket #36811,  I would like to add my info here:  We got the same warning today, and it comes from our serverside "Linux Malware Detect" (LMD, Maldet) tool, from  Seems they have changed somehow their reconnaissance pattern.

Maybe someone should tell them to exclude this akeeba files from their scanengine. I guess there will be more coming with this problem, als LMD is widely used.

In our case following files were critisized by the scanner:





In both case it was this critisized:



As it is obviously a false positive, the only solutions are on the hosting platform to exclude those files from LMD/Maldet scans in the configuration file,  and / or to inform and hopefully they would change it / whitelist it. I dont know if they would. Hopefully.

Have a nice day!
kind regards,

Akeeba Staff

Correct, these are all false positives.

restore.php is a “headless” Kickstart, i.e. it's Kickstart without the user interface. The integrated restoration has its own interface rendered by the backup software you are using. restore.php is by default inert, it needs a restoration.php file to activate (password-protected). This file is written by the integrated restoration code when you start a restoration and removed at the end of the restoration (the clean-up step).

The kickstart.txt file is just kickstart.php with a non-executable extension. It's used when you choose to upload Kickstart using the DirectFTP / DirectSFTP archiver engine and when you are using the Site Transfer Wizard. As I said, it contains restore.php plus the user interface.

The archive extraction code does things which are not typically found in PHP software such as extracting compressed data, using encoded data, creating and updating files, changing permissions, deleting files — all in the same file. The use cases where you'd see ALL of that in a single file are archive creation / extraction tools and hacking scripts :) That's why they need to manually whitelist the files.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

Support Information

Working hours: Typically we work Monday to Friday, 9am to 7pm Cyprus timezone (EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets, but we cannot respond to them, outside of our working hours.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!

Summer vacations: Our support will be closed for replies and new tickets from August 6th to August 21st, 2022 due to summer vacations.