• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

Reply to: Sites hacked

Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Sites hacked"

Collapse

  • DimPrawn
    replied
    Originally posted by minestrone View Post
    Runtime on the desktop has issues, java servers are very robust.
    Yes, the desktop runtime seems to be prime time hacker magnet and a great way to hijack your PC.

    Leave a comment:


  • minestrone
    replied
    Originally posted by DimPrawn View Post
    Everytime I've found a machine compromised the source of the infection seems to be bloody Java!

    Seems most common exploits these days are holes in the Java runtime.

    If you need need Java, don't have it on your systems!
    Runtime on the desktop has issues, java servers are very robust.

    Leave a comment:


  • xoggoth
    replied
    Ta but tried that link, all formats, and it came out as gibberish.

    Leave a comment:


  • chef
    replied
    Originally posted by administrator View Post
    If you could be arsed you could also decode the base64 somewhere like here:
    Base64 Decode and Encode - Online
    sounds a like a man who knows some stuff from previous experience of it happening to him. That or that he needs to know some stuff to stop the techie's on his forum accusing him of some stuff when the sh!t goes down and hits the fan.. if you know what I'm saying.

    Leave a comment:


  • administrator
    replied
    If you could be arsed you could also decode the base64 somewhere like here:
    Base64 Decode and Encode - Online

    Leave a comment:


  • administrator
    replied
    Originally posted by xoggoth View Post
    Darn it!!!! When I said I didn't use Wordpress earlier I forgot my sister has got this webby person to set up a thing for her where she can do educational blogs etc, it's an addon domain in a subdirectory. A quick search shows Wordpress uses many of those functions so that php.ini wil probably stop it working. Any way of restricting what directories php.ini applies to?
    And this is probably the source of the infection, not your passwords from filezilla getting hacked. Make sure the Wordpress installation and all plugins are up to date.

    Also the base64 code will create the iframe I expect, that's why you won't find it.

    Leave a comment:


  • Cliphead
    replied
    Originally posted by xoggoth View Post
    Darn it!!!! When I said I didn't use Wordpress earlier I forgot my sister has got this webby person to set up a thing for her where she can do educational blogs etc, it's an addon domain in a subdirectory. A quick search shows Wordpress uses many of those functions so that php.ini wil probably stop it working. Any way of restricting what directories php.ino applies to?
    The line I suggested adding will stop dodgy scripts server wide so there should be no need to specify directories and I'm not sure that can be done anyway. It shouldn't affect WP functionality at all but check the permissions on the WP config file and make sure it's locked down, suggest 600 if you know what that means then test.

    Leave a comment:


  • xoggoth
    replied
    Darn it!!!! When I said I didn't use Wordpress earlier I forgot my sister has got this webby person to set up a thing for her where she can do educational blogs etc, it's an addon domain in a subdirectory. A quick search shows Wordpress uses many of those functions so that php.ini wil probably stop it working. Any way of restricting what directories php.ini applies to?
    Last edited by xoggoth; 9 January 2013, 20:13.

    Leave a comment:


  • Cliphead
    replied
    Originally posted by xoggoth View Post
    Yes. They all start with <?php eval(gzinflate(base64_decode("...gibberish...
    I've had this sort attack on the past - slack permissions on a config file so check that firstly.

    Once you've added the above and restarted Apache or whatever none of that crap stuff can be injected or executed. Delete the files of course.

    Leave a comment:


  • xoggoth
    replied
    It's not uncommon for PHP malware to encode its files in various ways. The most common is simple base64 encoding,
    Yes. They all start with <?php eval(gzinflate(base64_decode("...gibberish...

    Apparently, if you change eval to echo then change the evals in that to echo etc you can discover the code, although don't think I want to bother trying it. Can't find any link to the iframe thing though.

    disable_functions = show_source, system, shell_exec, passthru, exec, phpinfo, popen, proc_open
    Cheers. I'll try that one.

    Leave a comment:


  • Cliphead
    replied
    Add this to your php.ini

    disable_functions = show_source, system, shell_exec, passthru, exec, phpinfo, popen, proc_open

    Stops dodgy php files that may have been added to your system from running.

    Leave a comment:


  • Sysman
    replied
    Originally posted by DimPrawn View Post
    Everytime I've found a machine compromised the source of the infection seems to be bloody Java!

    Seems most common exploits these days are holes in the Java runtime.

    If you don't need Java, don't have it on your systems!
    Wot DP said.

    Leave a comment:


  • NickFitz
    replied
    Originally posted by xoggoth View Post
    Not found anything that explains those encrypted PHP files.
    It's not uncommon for PHP malware to encode its files in various ways. The most common is simple base64 encoding, as that's easy to reverse; it just serves to obfuscate things. Search through your other files for any calls to base64_decode() that oughtn't to be there, and if you find any, work out what they're trying to decode and make sure it isn't there

    Leave a comment:


  • DimPrawn
    replied
    Everytime I've found a machine compromised the source of the infection seems to be bloody Java!

    Seems most common exploits these days are holes in the Java runtime.

    If you need need Java, don't have it on your systems!

    Leave a comment:


  • d000hg
    replied
    Originally posted by xoggoth View Post
    Ta d00000gh but dont use Wordpress or any other addins.
    By 'et al' I also mean stuff like Apache, and ANYTHING installed on your server which allows incoming connections.

    Leave a comment:

Working...
X