• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

'Gumblar' and 'Martuz' infections

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    #11
    Originally posted by WeWatch View Post
    The FTP clients that store the saved login credentials in plain text are usually the ones hit first.

    For instance:

    1.CoffeeCup Direct FTP
    2.TransSoft FTP Control 4
    3.Core FTP
    4.GlobalScape CuteFTP
    5.Far Manager (with FTP plugin)
    6.FileZilla
    7.FlashFXP
    8.SmartFTP
    9.FTP Navigator
    10.Total Commander

    All save the stored login credentials in plain text making it easy for the virus to find and steal them. It then sends them to a server that logs into the website, downloads files, infects them then uploads them back to the website.

    I've like Avast, but Antivir might work well too.

    For those who think that simply not saving their credentials will protect them, think again. The virus works as a sniffer and a keyboard logger too. So any FTP connection, since it transmits all data in plain text, is easy pickin's for the virus.

    As a complete line of defense, you can switch to WS_FTP which encrypts the login information and then also switch to SFTP, if your hosting provider supports it. SFTP encrypts the data stream so it can't be sniffed.

    The server will also many times, upload various back doors to the website too. These backdoors will typically be .php files with a string like:

    Code:
    eval(base64_decode(
    then a long list of characters. This will usually be inserted into the first line of a .php file before the legitimate <?php tag.

    So it will actually look like:

    Code:
    <?php eval(base64_decode('aWYoaXNzZXQ.....'));?><?php (legitimate code)...
    These backdoors allow the hackers to re-infect the website after the FTP credentials have been changed and the virus removed.

    Just thought you'd like to know...
    Thanks for this WeWatch...

    How do you clean this up - simply remove the eval line?
    "I can put any old tat in my sig, put quotes around it and attribute to someone of whom I've heard, to make it sound true."
    - Voltaire/Benjamin Franklin/Anne Frank...

    Comment


      #12
      If your box has been compromised there is only one sure fire way to clean it.

      Reinstall!

      you can try and pull out all the dodgy files and back doors, but there is no guarantee you will capture everything.

      Comment


        #13
        I would love to get my hands on the little sh*ts that create these things. They wouldn't be able to do any more typing when I'd be finished with them.

        Comment

        Working...
        X