Go Back   vb.org Archive > vBulletin 4 Discussion > vB4 General Discussions
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Display Modes
  #1  
Old 05-03-2012, 06:43 PM
revmitchell revmitchell is offline
 
Join Date: Dec 2006
Posts: 128
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default My site has been hacked

Our website has been hacked. http://www.pastors-source.com


When you click on most any link it will automatically redirect you to another site that is labeled as an attack site by AVG. The attack site is:

opoluicenotgo.ru:8080/forum/showthread.php?page=beb2436a164c6222


I do not know how to fix this. I have re-uploaded all the vb files. Not sure where the redirect code could be.
Reply With Quote
  #2  
Old 05-03-2012, 06:58 PM
borbole's Avatar
borbole borbole is offline
 
Join Date: Jan 2010
Posts: 2,559
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Check the database. Also do a check up of your server space. And as last but not least ask your host to check their logs to see what happened and how it happened.
Reply With Quote
  #3  
Old 05-04-2012, 07:46 AM
Elbulus Elbulus is offline
 
Join Date: Feb 2006
Posts: 17
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Been hit by this aswell on my Forum. Let me know if you manage to find anything i've currently reuploaded all VB files and it's still happening.

I did find a odd folder called files in the forum folder which contained loads of HTML web pages for some Russian site deleted those, also found that they had modified all of the .htaccess files they could to apply the redirect.

They also had a file called coms.php which seemed to be linking back somewhere else.

Also another index file was created called index.html which seemed to list everything in the directory.

The site is hosted on my own VPS and it's the only one affected i'm not too sure what i should be looking for in the database anyone have any clues ?

I'm just going to have a look in the logs and see if i can find anything there.

--------------- Added [DATE]1336135859[/DATE] at [TIME]1336135859[/TIME] ---------------

Turns out i should always attempt to fix things when properly awake, Found 1 last .htaccess file they added and it's all working fine now, no more redirections.
Reply With Quote
  #4  
Old 05-04-2012, 03:38 PM
The Rocketeer's Avatar
The Rocketeer The Rocketeer is offline
 
Join Date: Jun 2010
Posts: 319
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

how did they add the .htaccess file? if its a vbulletin related issue?
Reply With Quote
  #5  
Old 05-05-2012, 02:57 PM
silentsamurai silentsamurai is offline
 
Join Date: Jan 2009
Posts: 1
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

This must be something new that started this week. As of May 2nd this happened to my site as well...

www.camasvalleyfundays.com

I am currently in the process of re-uploading my entire file database back to 4/1/12. If that doesn't work I have no idea what to do from here. I've looked on .php file and dont see anything out of place or additions with opoluicenotgo.ru written in it.

if you click that link it goes to my forums, but my index is missing and if you go to google and search camas valley fun days, click the first link you get that opoluicenotgo.ru link saying its a virus....No bueno
Reply With Quote
  #6  
Old 05-06-2012, 06:58 PM
alirex alirex is offline
 
Join Date: Nov 2007
Posts: 25
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Just a small suggestion , this all happen with me too actually this all happen on an iframe with height=0px and width=0px it was injected by some means i dont know but almost all my sites got effected one time only. After that so far not.

So its good to find the 0px by 0px iframe in your styles i am sure u will solve this issue urself.
Reply With Quote
  #7  
Old 05-07-2012, 04:30 PM
syrus.xl's Avatar
syrus.xl syrus.xl is offline
 
Join Date: Jun 2005
Location: In a cyber world...
Posts: 999
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Searching for malicious URL's normally will not give you the right answers.

Check under Plugins & Modifications > Plugin Manager then under Product: vBulletin look for any plugin with a hook_location of ajax_start. If you see anything there click Edit, if it looks like a load of strange characters it is probably the base64 encoded SHELL. Delete this ASAP

The previous poster suggested looking for 0px by 0px iFrames, this is one way SQL Injection may look in some source code or your templates, but it can also be hidden in your database. Search your database using phpMyAdmin, and use the following wildcards:

%base64%
%iframe%

The trouble with the iframe code now is it is ussed by vBulletin legitimately, therefore be careful. Any base64 is normally associated with malicious coding, and normally found in your Template table, and the datastore.

Sometimes you can remove such code just by resaving any template that you know you have not altered in anyway.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 08:32 PM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.03816 seconds
  • Memory Usage 2,213KB
  • Queries Executed 11 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)ad_showthread_firstpost
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (7)post_thanks_box
  • (7)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (7)post_thanks_postbit_info
  • (7)postbit
  • (7)postbit_onlinestatus
  • (7)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete