![]() |
Fuck!! My websites where hacked - anyone here that can read code ?
Got a mail from a surfer saying that his virus blocker whent nuts on my front page, so I check it out and sure enough, burried in the html of the index file theres a string of java code that does not belong :(
Checked all sites and found it on 2 other pages too, so looks like some fucker haced into the server and placed the code.. Talking with host about that now. What i really would like to find out is what this code does, and if it leaves some trail, like to a website or something, so that i can maybe track down who's behind this.. only most of it looks like this "%99%C1%CA%D7%BD%D0%D1%DA%C9%..." so i have no clue what to make of it.. Any script wizzes that can help ? :helpme |
Yeah, gimme a few minutes and I'll help you out
|
Quote:
|
Quote:
e = '0x00' + '22';str1 = (...) I got the same one. Itīs a trojan which has to be uploaded through ftp. If itīs the same source code (javascript), you should change your ftp logins at once. Donīt use the same login and pw combination for ftp and for sponsor sites. |
Do a search, there was a lot of threads about this last month. If its the same exploit, the CMS you're using has a vulverability. And its javascript, not java ;)
|
Ok, is the hacked version of the page still online (if so, what is the URL)?
|
Tripping balls.
|
was it the same as this?: http://www.gofuckyourself.com/showthread.php?t=624482
|
Change your FTP password, remove the script at the bottom of the page that runs the iframe:
[code=trojan stuff on your pages] <script language="JavaScript"> e = '0x00' + '22';str1 = "%99%C1%CA% blah blah blah </script> [/code] You might have your host run a check to see what other files were modified at the same time. Pattern to look for is: Login, Get File, Put File, Get File, Put File, Logout usually no failed password attempts. Sources for your password leak: People that have installed software for you in the past, anyone that has had FTP access to your machine, possibly any keylogger on your system. The script forces the installation of an "start.exe" which connects to a site hosted at "inhoster.com". I donīt think itīs worth to contact them if you have a look at their site. The site called us-counter.com and dnv-counter.com belong to a guy from Ukraine and are blacklisted with several records. IPīs from the sites and from the hosting company are pretty much the same. |
Quote:
Have a very unique login combination for ftp, not used anywhere else.. Only did share with the most nessesary people (Billings etc.) so kinda "hope" it was hacked.. Still going to change it now offcause :o( |
Quote:
Have a very unique login combination for ftp, not used anywhere else.. Only did share with the most nessesary people (Billings etc.) so kinda "hope" it was hacked.. Still going to change it now offcause :o( |
Quote:
Hope you can make anything out of it that can help trace who put it there :thumbsup |
That sucks man. i hope u get it fixed soon...
|
Also ask Smokey the bear about it. He has helped a few people with issues similar.
|
Quote:
|
Quote:
|
Quote:
|
get your server admin to protect your tmp folder.. run in shell to make it secure.. (so no files can be put in) ill find you the command in a sec
|
Quote:
2 quick questions. 1)whats a keylogger 2) this "start.exe" file.. does it pull that file from my server, as i cant seem to find such file ? |
That sucks man, sorry to hear that.
|
oh and guys that script isent the trojan it self.. that just runs the file in your tmp folder.. like i sed get it secured and it will stop the script running the trojan.
|
You wonīt find the "start.exe" on your box. It is installed on the PC of the visitor who visits your website. Thatīs what the sript is doing.
A keyloggeris a spyware program which monitors and reports nearly every movement on you PC (for example login onfo and passwords). So you should have a look at your machine as well. |
Quote:
|
Quote:
http://sophie.blogkontrol.com/fedfest.gif |
Quote:
|
Beat me to it.
Here's the name of the virus if you didn't get that figured out yet HTML.HelpControl!exploit |
What CMS do you use?
|
Quote:
|
Quote:
Doing some digging, that does seem to tie to the "inhoster.com" site that m4yadult mentioned. |
Quote:
|
check all the index pages of all the websites hosted in that server.
It happened to me about a month ago, I was so pissed! |
All times are GMT -7. The time now is 06:51 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123