![]() |
Hacked Sites, How Many Recently?
Seems like everyone is getting hacked. Some threads say over 200 in the past month. Ours, http://www.seriousoffshore.com/forums/ , and one of our main members, http://www.donzi.org/ were both hacked the end of last week/over the weekend.
Has anyone been able to find out why so many recently? Ours seems to have the hack code inserted the first part of September, then activated later. So, our recent backups are also infected which has created a major pain. I hope this is the right place to ask the question. |
I have not seen a list or a count on the number of sites, but they almost all have to due with the install directory not being deleted.
To recover, please read the following two blog posts: http://www.vbulletin.com/forum/blogs...ve-been-hacked http://www.vbulletin.com/forum/blogs...vbulletin-site Also please see these recent security announcements: vBulletin 4.1.x-4.2.x & All versions of vBulletin 5: http://www.vbulletin.com/forum/forum...-1-vbulletin-5 vBulletin 5.0.x patch released, for a different security issue: http://www.vbulletin.com/forum/forum...d-all-versions |
Have you seen the redirect worm that is in the seriousoffshore.com/forums before (if you've looked)? They did get in through the install as you said, but then they created admin users, modified files in the admincp folder, the style templates, and the plugins. The admincp and database hacks are pretty severe. Plus, because of the delay for when it went active, our backups are infected. As our webmaster says, Every time he thinks he has everything, something else pops up.
Anyway, if anyone is familiar with the pain of this one, helpful hints are certainly appreciated. Thanks for the input so far. |
If you follow the two blog posts, thoroughly, and not skip any details at all, you should be ok.
|
Quote:
|
No one said it was easy, but there have been many successful sites to recover following the info provided in there.
|
Well I guess mine has been one of the few that continues to have issues even after doing everything and more in all of those blogs.
|
Quote:
|
What is the things that keep popping up, always different, same thing, and what is the things?
|
well all he does now is when you go to the forum.php page it take you to an html page but not necessarily redirecting you anywhere. So I usually just run the upgrade script and is back to normal. So today I deleted all of the custom templates and uploaded new ones just in case the code was in there, but I have done everything else possible.
|
Hopefully that will work, if not report back, and let us know.
|
Revert the forumhome template, chances are they modified that. The blog posts over on vBulletin.com cover fixing this stuff. Very well too.
|
I don't know if this helps you guys in anyway, but here are a few of the comments from the two webmasters. Any comments about future protection? We believe we are clean at serious now. I hid their email addresses.
This is 'one' of the hacks we were infected with and the one that's caused the most trouble. They had access to all of our files AND databases and injected code throughout the databases. http://www.derekfountain.org/security_c99madshell.php On Mon, Sep 30, 2013 at 8:50 PM, *****wrote: hmmm... we were told today the server house carried the infection to us,,, and thousands more we locked our front door until the server is clean In a message dated 9/30/2013 8:31:08 P.M. Eastern Daylight Time, *****writes: It's not coming through the site files, I've cleaned all those...it's being injected from the database. On Mon, Sep 30, 2013 at 8:21 PM, ******* wrote: go to your .exe file and find this entry >> 1E161D6D.exe see if you can delete it if it's there In a message dated 9/30/2013 8:16:56 P.M. Eastern Daylight Time, *****writes: Yeah....there's a redirect javascript buried in there somewhere. I'm chasing it now. Got rid of everything else though. I'd like to pummel the nerd that put this one together. On Mon, Sep 30, 2013 at 8:09 PM, ********* wrote: I just logged on SO and entered my password to look around my MS virus blocker went apeshit as soon as I clicked on the forum header 8 pings in 3 minutes... quarantined every ping wow, bad bad bad btw, this same virus crashed the U of Colorado website and countless others |
Mine got hacked on Monday. Everything was corrupted and the only option was pulling the site down completely.
However, I did manage to log the IP: 176.45.4.205 |
Cool. Now you only have to get SaudiNet to cooperate.
|
Quote:
|
my site was also hacked ... they put this page ..
Quote:
|
Thank you, I have added this to my collection of variances for this exploit. The good news is this is just using the same initial exploit so after you cleaned your site "carefully" and follow the latest guidelines you should be okay. Normally, I don't like exploits posted, but at this point it is all over the web, and education is the best policy now -- in my opinion, I am only a volunteer and I am not directly affiliated with vbulletin.
If I can help with information, please feel free to ask. Do you have your board up and running again? |
Everyone should report the page:
https://www.facebook.com/Str4whatPir...itmentZone.gov And group: https://www.facebook.com/groups/Str4...itmentZone.gov Both listed in your malicious code, hhumas. With enough reports, these will be taken down for promoting hacking / cyber attacks. I just reported too, for violence/threat of attack. |
Okay I need help badly.
1. I have restored my older version of Web files. 2. Upgraded to newer version of VB ....now vb 4.2.1. 3. Cleaned suspect files. 4. Looked at the plugin. Still nothing ..... My forum is showing forum.php that is not the physical forum.php on the webserver. There must be an entry somewhere that is displaying the page. Here is the link to my page. What else do i ahve to do ???? http://forum.automationmedia.com/ |
SupportAM, look in Styles -> Templates -> FORUM HOME.
Use this to check for other templates: https://vborg.vbsupport.ru/showthread.php?t=281080 |
it goes to forum.php
and using that tool didn't help either. :( |
Hi,
Our forum was also hacked. Our provider found out that this was probably the problem. Maybe it helps other forum owners. We removed the bad code from your site's template header. It was a malicious js code that was creating a hidden iframe to infelobarc1979.tk. Please remember to change all your passwords and keep vBulletin up-to-date |
What a mess, but we believe both sites are now clean. We also had every mod and admin change passwords. We are watching as closely as we can, but what a giant pain.
Am I wrong, or did vbulletin only put a notice up warning everyone about the problem found in early September, like the 4th or so? They did not send out emails to those using their software with current licenses? Unless I completely missed something, that is what I see. If that is the case, is that why so many sites are currently under siege? The hackers read the notices but we certainly don't go to .com or .org anywhere close to every day. The hack in ours was inserted almost two full weeks before activation. That way our backups were also corrupted for use. |
The notices were pushed out in the ACP. That is how I found out and made the appropriate fixes right away. I log in everyday to my ACP.
BOP made a wonderful mod however that will send you these notices if you do not log on into your ACP. https://vborg.vbsupport.ru/showthread.php?t=301841 |
Folks who are getting hacked and have SSH/root user access that comes along with VPS or dedicated server hosting may have more tools available for them to properly clean up hacked forums and the left over infections. I just posted a summary guide here http://www.vbulletin.com/forum/blogs...ting-ssh-users which basically is a small excerpt of the much larger 10 page guide ?http://vbtechsupport.com/2355/.
|
All times are GMT. The time now is 09:30 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|