vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   vB4 Programming Discussions (https://vborg.vbsupport.ru/forumdisplay.php?f=252)
-   -   I've been hacked? (https://vborg.vbsupport.ru/showthread.php?t=315512)

Buzzle 11-20-2014 11:06 AM

I've been hacked?
 
Hi, I logged onto today to see a random account i've never seen before with administrator. This is what he did

http://puu.sh/cYklR/820873f86e.png

Can someone tell me how he got access or what he was doing once he was in.

Thank you.

Edit: /install directory has been deleted already.

Edit: Version 4.1.5 (Latest version)

Dave 11-20-2014 11:07 AM

Please post all of your active add-ons here.
We also need to know which vBulletin version you're using.

ozzy47 11-20-2014 11:08 AM

Please read the following two blog posts:
http://www.vbulletin.com/forum/blogs...ve-been-hacked
http://www.vbulletin.com/forum/blogs...vbulletin-site
Also please see these recent security announcements:
vBulletin 4.1.x-4.2.x & All versions of vBulletin 5: http://www.vbulletin.com/forum/forum...-1-vbulletin-5
vBulletin 5.0.x patch released, for a different security issue: http://www.vbulletin.com/forum/forum...d-all-versions

What version of vB4 are you running?

Buzzle 11-20-2014 11:09 AM

Quote:

Originally Posted by Dave (Post 2523484)
Please post all of your active add-ons here.
We also need to know which vBulletin version you're using.

I'm using version 4.1.5 (Latest version)

By add-ons are you referring to products? If so

http://puu.sh/cYmWF/5856b728c1.png

ozzy47 11-20-2014 11:13 AM

Well first off, that version is outdated, and has unpatched security issues, you should be running the latest 4.2.2 at a minimum, or 4.2.3

Inferno shout is outdated, and most likely did not come from this site, I would ditch that and get a different shout, such as it's newer version, https://vborg.vbsupport.ru/showthread.php?t=236970

Dave 11-20-2014 11:14 AM

Alright, that looks fine.
Now:

- Be sure the /install folder is not present on your vBulletin installation.
- Check all of your active plugins, there shouldn't be any fishy plugins with odd names.
- In your ACP go to Maintenance > Diagnostics > Suspect File Versions. Check if there are any weird files which were created recently on your server.
- Change the password of all administrator/moderator accounts.
- Protect your ACP with a plugin like this: https://vborg.vbsupport.ru/showthread.php?t=296383

Edit: vBulletin version is very outdated, update to the latest.

Buzzle 11-20-2014 11:15 AM

Quote:

Originally Posted by ozzy47 (Post 2523487)
Well first off, that version is outdated, and has unpatched security issues, you should be running the latest 4.2.2 at a minimum, or 4.2.3

Inferno shout is outdated, and most likely did not come from this site, I would ditch that and get a different shout, such as it's newer version, https://vborg.vbsupport.ru/showthread.php?t=236970

Do you have any idea how the hacker got access to begin with?

ozzy47 11-20-2014 11:15 AM

Also check your plugins, ACP --> Plugins & Products --> Plugin Manager and see it there are any unknown plugins running under vBulletin

ozzy47 11-20-2014 11:16 AM

Quote:

Originally Posted by Buzzle (Post 2523490)
Do you have any idea how the hacker got access to begin with?

Well it could have been any of the security issues in the version you are running, or through Inferno shout.

ozzy47 11-20-2014 11:17 AM

Quote:

Originally Posted by Dave (Post 2523489)
Alright, that looks fine.
Now:

- Be sure the /install folder is not present on your vBulletin installation.
- Check all of your active plugins, there shouldn't be any fishy plugins with odd names.
- In your ACP go to Maintenance > Diagnostics > Suspect File Versions. Check if there are any weird files which were created recently on your server.
- Change the password of all administrator/moderator accounts.
- Protect your ACP with a plugin like this: https://vborg.vbsupport.ru/showthread.php?t=296383

Edit: vBulletin version is very outdated, update to the latest.

Only one I would ditch Dave is Inferno shout.

Buzzle 11-20-2014 11:17 AM

Quote:

Originally Posted by Dave (Post 2523489)
Alright, that looks fine.
Now:

- Be sure the /install folder is not present on your vBulletin installation.
- Check all of your active plugins, there shouldn't be any fishy plugins with odd names.
- In your ACP go to Maintenance > Diagnostics > Suspect File Versions. Check if there are any weird files which were created recently on your server.
- Change the password of all administrator/moderator accounts.
- Protect your ACP with a plugin like this: https://vborg.vbsupport.ru/showthread.php?t=296383

Edit: vBulletin version is very outdated, update to the latest.

I've ran the scan and the only thing that it couldn't recognize were the plugins I added. I want to back my forums up but couldn't it just happen again?

Also, i've searched the plugin manager. Everything seems to be normal.

ozzy47 11-20-2014 11:18 AM

As I said in post #2, you need to follow the links.

Please read the following two blog posts:
http://www.vbulletin.com/forum/blogs...ve-been-hacked
http://www.vbulletin.com/forum/blogs...vbulletin-site
Also please see these recent security announcements:
vBulletin 4.1.x-4.2.x & All versions of vBulletin 5: http://www.vbulletin.com/forum/forum...-1-vbulletin-5
vBulletin 5.0.x patch released, for a different security issue: http://www.vbulletin.com/forum/forum...d-all-versions

Make sure you do not skip over any steps.

Buzzle 11-20-2014 11:21 AM

Quote:

Originally Posted by ozzy47 (Post 2523495)
As I said in post #2, you need to follow the links.

Please read the following two blog posts:
http://www.vbulletin.com/forum/blogs...ve-been-hacked
http://www.vbulletin.com/forum/blogs...vbulletin-site
Also please see these recent security announcements:
vBulletin 4.1.x-4.2.x & All versions of vBulletin 5: http://www.vbulletin.com/forum/forum...-1-vbulletin-5
vBulletin 5.0.x patch released, for a different security issue: http://www.vbulletin.com/forum/forum...d-all-versions

Make sure you do not skip over any steps.

So if I ditch inferno, back it up from a safer time, add ACP protection there would be no way he could access it again?

Dave 11-20-2014 11:23 AM

Without having access to your ACP and access logs, we don't know how the person accessed your ACP.

ozzy47 11-20-2014 11:23 AM

There might, that is why you need to follow all the instructions in the blog posts, as well as ditch inferno.

ozzy47 11-20-2014 11:24 AM

Quote:

Originally Posted by Dave (Post 2523497)
Without having access to your ACP and access logs, we don't know how the person accessed your ACP.

And if they are smart, they deleted this info. :)

Buzzle 11-20-2014 11:24 AM

Quote:

Originally Posted by Dave (Post 2523497)
Without having access to your ACP and access logs, we don't know how the person accessed your ACP.

Is there a chance you can come on my teamviewer and have a look?

TheLastSuperman 11-20-2014 11:25 AM

Ahh one of the multiple admin, do import hackers - look for one or more shell scripts uploaded to your server. Sometimes in clientscript/ or /includes and be sure to check any sub-folders.

Are you running any nulled modifications? Inferno Shoutbox Revolutionized what's that? :p

I'd submit a ticket and ask your hosting company to scan w/ whatever they have setup on their server be it Maldet (also referred to as Linux Malware Detect (LMD)) or similar but before warned some of these shell scripts are custom per site (depends on if you were worth their time) so Maldet and others do not always pick those up and the ONLY way to be sure is to go through all your folders by hand.

*Some stuff will stick out like a sore thumb, same way they want to be pompous and instead if using legit names like Admin for the 5-6 spare accounts its always something cocky such as lolwut, lmao, amongst other names I've since long forgotten :cool: the point being most of its easily spotted (file names such as shell.php / sexy.php / lol.php and similar) but every so often they hide one or mores files very well w/ names that seem valid so be sure to use the Maintenance tools in admincp and do suspect files and other tips in the links Ozzy posted above.

ozzy47 11-20-2014 11:26 AM

TBH it don't matter now how they got in, you need to plug the holes. First off by following all the instructions in the blog posts, then upgrade to at least 4.2.2

Buzzle 11-20-2014 11:30 AM

Alright, i'm going to back it up to yesterday and remove inferno shoutbox. Anything else?

TheLastSuperman 11-20-2014 11:31 AM

Ok I remembered even more after I ran off to another thread so back to share! See my post here as this is a very similar situation and check for those plugins I listed or similar ones.

http://www.vbulletin.com/forum/forum...31#post4012531

Dave 11-20-2014 11:31 AM

I have 1 hour of spare time, you may PM me your Teamviewer information and I'll take a look for you.

ozzy47 11-20-2014 11:41 AM

Quote:

Originally Posted by Buzzle (Post 2523503)
Alright, i'm going to back it up to yesterday and remove inferno shoutbox. Anything else?

You need to follow the instructions in the blog post I linked you to. It don't matter if it was not like this yesterday, they could have loaded the scripts months ago. Now they finally decided to act on them.

Follow the instructions, and upgrade to 4.2.2

If you decide to take the easy way out, you will just be hit again, as the site is now on their radar.

RichieBoy67 11-20-2014 03:04 PM

It depends if that was indeed the hole and what he did while inside. An easy way to see exactly what he did is to look at your server logs.

ozzy47 11-20-2014 03:23 PM

The shout is most likely a old version that was re released by a hacking team, and I won't mention their name. :)

Also the vB version being run has un patched security issues, as does any version below 4.2.2

Another thing it could be the install directory was still in the root.

Either way, the OP needs to follow the directions in the blog posts, then upgrade to 4.2.2

RichieBoy67 11-20-2014 03:46 PM

I know that hacking team only too well. :(

Yep, I agree to stick with the plan though I didn't read it. lol Was just saying to check server logs. it is one of the first things to do upon being hacked. :)


All times are GMT. The time now is 05:05 AM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.01978 seconds
  • Memory Usage 1,795KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (9)bbcode_quote_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (26)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete