Quote:
Originally Posted by KissOfDeath
what their doing is creating a backdoor to come back in later.
so then i figured it must be a file uploaded on the server because from what i've seen of the plugin being used gives them the ability to upload files to the server, so then i checked the file dates and found a suspicious "clock.php" file in the custom avatars folder that had been created the same day as the plugin above was installed so i removed that and restored another database backup from the 24th which is the day before the guy registered an account on my forums
I've changed admin, cpanel, & ftp passwords so i'll see where it goes from here, just removing the install folder is not enough,
here's an example of a file someone has uploaded as a backdoor back in to a forum http://www.paccin.org/deface.txt i guess their must be more files as well but this i all is could find on google
|
Hello,
Thank you for these details.
I was able to see these backdoor (php) files - about 4 in different names (gs.php, test.php, dyna_statistic.php) with exactly same content installed in the following folders:
customprofilepics
attachments
captcha
vba_dyna_modules
Deleted those files today.
Removed install directory the very next day of being hacked (6-Sep).
Changed cpanel/FTP, vbulletin database and admin account passwords.
I didn't find anything injected into the database, so should I restore it? Then the members posts will be lost!
What more should I do to keep the hacker away?