![]() |
Solving filestore72 hack. How to clear the database table?
I'm sorting out a filestore72 attack on my site. I'm upgrading vB to the latest version, changing passwords, deleting suspicious files, removing plugins etc.
My question is this: There is some malicious code inserted in the datastore table of the database. It's in various places of that table and is encrypted. How can I clear that? Can I simply delete that table and have vB recreate it somehow? Or is there another way of dealing with this? |
|
Thanks, smirkley. I had found that the other day and initially got excited, but it doesn't appear to do much except send you an email to tell you that the database is infected. I already know that the database is infected and which table the infection is in. I also know which text it is in the table that shouldn't be there.
What I'm hoping to get is advice on how I can delete that infection in the datastore table (not the datastore file which is something else and which, apparently, can be recreated by turning off all the plugins and then turning them back on again). |
Try editing any plugin, don't change anything, then hit Save, that may remove it.
|
What is this filestore72 hack ? And how do I protect the forum ?
|
Remove your install directory, it is a redirect to that site.
|
Thanks ozzy, that didn't work. I still have the several blanks lines which seem to have been inserted deliberately followed by some encrypted text:
"....59}i+G^<+c@ve6<Z]8daDc@KO4]>LKY#eN<v8c6pe8Y#~M*{~k{S}ME;O79{e8YfL4nb8c6M~K<M~ M~?t7{P+G^5+c;1]><@~a+1~ata$,..." I even then went to the extent of uninstalling the only plugin I had (glowhost) to no avail. |
Quote:
|
As I've said in the other thread, I've never used vBSEO. Ever. Never even considered using it. So let's stop blaming vBSEO ;)
Quote:
|
|
Thanks ozzy. I've already removed the only plugin I had and am going to be upgrading to the latest version of vB but wanted to clear the database of any infection first.
I tried your first command and got an error saying that DatabaseName.plugin didn't exist. I tried swapping "plugin" for the table name but that didn't work either. I got the same problem with the second command i.e. an error message saying that the table template doesn't exist. Quote:
--------------- Added [DATE]1379422949[/DATE] at [TIME]1379422949[/TIME] --------------- Nope, that didn't work. I backed up the db, edited the datastore.MYD in Notepad++ and uploaded it and I was getting all kinds of SQL errors. I had to revert to a saved copy of the database. |
Quote:
PHP Code:
prefix_tablename Also don't edit via notepad++ when you can edit via phpmyadmin, not all data is meant to nor can be edited that way. |
Update: AdminCP > Maintenance > Repair Tables seems to have done it! :)
The table is now clean! :) But, of course, the infection may exist in other tables so I would still be keen in running a search through the whole database for any malicious code. To answer your question, yes, it's in phpmyadmin. |
Quote:
Also are you 100% sure that your files are clean? Make sure you download the same version of vBulletin from the members area, overwrite all vBulletin files AND while you are in there check the date on files the timestamps rather... any new files? Any recently modified files per the timestamps? If so overwrite those with clean files and/or delete. |
Quote:
Ran both the queries. The first one came up clean. The template search came up with a few results in the form of : Quote:
|
All times are GMT. The time now is 05:40 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|