If you have submitted a ticket, DH will get back to you with information about cleaning up the hacked files on your server that should help guide you. This is something that you, as the webmaster of your hacked domain, will have to take care of.
There is a lot of good info in the long thread here that should give you the info you need to clean-up your site (or you may just want to re-install it from back-ups) and get it more secure.
Most likely, out of date installations on your server (WordPress, Joomla, out-of-date or insecure plug-ins and themes!, or other PHP-based sites) allowed this hack. You aren’t being personally targeted, MANY sites here and at other servers have been hacked recently. Sites are targeted by these hack-bots daily.
Also read this:
This post (from page six of that long thread) by dhtr lays out the basic steps you need to take to clean up the files and find open directories.
From: dhtr RE: Sites hacked
[quote]I finished cleaning up all of my sites last night.
Here’s the process I used to cleanup an infected site:
Run command line version of the 2.4 cleaner script shown above, using this shell command (let it fully complete -- sometimes takes a while!):
time php cleaner-cli_2.4.php 2>&1 >> cleaner_log
Find and remove those randomly named "payload" files mentioned above, using this shell command:
grep -Rinl "JGs9MTQzOy" * |xargs rm -f
Remove the .logs directory that sometimes shows up in web root, using this shell command:
rm -rf .logs
Locate any 777 / world-writeable directories, using this shell command:
find . -type d -perm -o=w
Set all 777 directories to 755. See reference at bottom of page here: http://wiki.dreamhost.com/Troubleshootin...irectories
Test any features that were uploading to the previously 777 directories, to make sure they still work.[/quote]
This, from Dreamhost’s Status blog has some more info about securing your site:
Read this thread, too:
Make sure you are running your sites with Enhanced Security and your users with Enhanced security.