OUR SITES WERE HACKED!

talk about cs related topics here!

User avatar
sammy
Site Admin
Posts: 6393
Joined: Sat Oct 18, 2008 12:16 am

OUR SITES WERE HACKED!

Post by sammy » Sun Apr 04, 2010 11:08 pm

[nicode 33797247] DreamHost Security Alert - Compromised User
From: DreamHost Security Bot <secalerts@dreamhost.com>View Contact
To: http://www.40calgames.com" onclick="window.open(this.href);return false;


--------------------------------------------------------------------------------

We have noticed hacked processes running under your fortycal user that are indicative of PHP web software installations being hacked. To keep your site and the server secure I have disabled the following domain directories by renaming the domain directory to end in "_DISABLED.." -- please do NOT reinstate the domain until you have thoroughly executed the instructions below:

/home/fortycal/cswargames.com
/home/fortycal/furyclan.com
/home/fortycal/on24cstrike.com
/home/fortycal/reignclan.com
/home/fortycal/cswraith.com
/home/fortycal/cswarlords.com
/home/fortycal/40calgames.com

Most commonly hacking exploits of this nature occur through known vulnerabilities in outdated copies of web software (blogs, galleries, carts, wikis, forums, CMS scripts, etc.) running under your domains. To secure your sites you should:

1) Update all pre-packaged web software to the most recent versions available from the vendor. The following site can help you determine if you're running a vulnerable version:
http://secunia.com/advisories/search/" onclick="window.open(this.href);return false;

- phpBB installations should be updated to the current secure release of 3.0.6 or the legacy release 2.0.23.
- Any old/outdated/archive installations that you do not intend to maintain need to be deleted from the server.

You should check any other domains (if applicable) for other vulnerable software as well, as one domain being exploited could result in all domains under that user being exploited due to the shared permissions and home directory. Also make sure to check ALL of your web software packages (even those not listed) as we are not able to check for everything automatically.

2) Check your software control panel for outdated or unauthorized plugins/mods/components/etc. if applicable. Some exploits can add new plugins/components that continue the infection even if you've updated the core software version. Some plugins can themselves be the source of vulnerability, so it's a good idea to ensure you've got the latest versions possible.

3) Go through all files under the affected user and look for anything that may have been modified or placed by the hacker. It is common for the intruder to place extra <?php> blocks (this is VERY common with these ZenCart hacks!), iframes, javascript <script> tags, etc., frequently at the top or bottom of otherwise legitimate files. Often times this code is obfuscated or encoded such that you cannot tell what it does simply by reading it. Also note that hackers often leave behind shell/backdoor scripts that thy can later use to re-exploit the site even after all other vulnerabilities have been patched. Often these scripts are given innocuous names like "cache.php" or "template.php", or they may be more conspicuous nonsense names or include red flag words like 'shell'.

More general information on this topic is available at the following URL:
http://wiki.dreamhost.com/Troubleshooting_Hacked_Sites" onclick="window.open(this.href);return false;

If you have any questions, please respond directly to this email.

Thank you for your cooperation!
-Happy DreamHost Security Bot
Image

User avatar
sammy
Site Admin
Posts: 6393
Joined: Sat Oct 18, 2008 12:16 am

Re: OUR SITES WERE HACKED!

Post by sammy » Sun Apr 04, 2010 11:11 pm

after 8 hours of following the instructions....we're back guys!
sammy
Image

Belcross
Posts: 3309
Joined: Sat Oct 18, 2008 4:00 pm

Re: OUR SITES WERE HACKED!

Post by Belcross » Sun Apr 04, 2010 11:13 pm

Does this mean I need to change my password? :P

User avatar
sammy
Site Admin
Posts: 6393
Joined: Sat Oct 18, 2008 12:16 am

Re: OUR SITES WERE HACKED!

Post by sammy » Sun Apr 04, 2010 11:20 pm

Belcross wrote:Does this mean I need to change my password? :P
no..it had nothing to do with you!
Image

smfreak
Posts: 396
Joined: Thu Oct 23, 2008 3:42 pm
Location: Irving Tx

Re: OUR SITES WERE HACKED!

Post by smfreak » Sun Apr 04, 2010 11:50 pm

Thank you sammy!
Image

User avatar
mouse
Posts: 152
Joined: Mon Jul 06, 2009 7:44 pm
Location: Kansas
Contact:

Re: OUR SITES WERE HACKED!

Post by mouse » Mon Apr 05, 2010 8:16 am

Thanks Sammy for staying on top of this and keeping us up and running.
Greed will always make you poorer!
Never measure the height of a mountain until you have reached the top. Then you will see how low it was!

slicky
Posts: 2593
Joined: Sat Oct 18, 2008 3:19 pm
Location: La Mirada, California

Re: OUR SITES WERE HACKED!

Post by slicky » Mon Apr 05, 2010 9:22 am

if you have the ip of the hacker, use your breadstick. :P
An most amazing 40cal admin yet.
Image
Image

puppet
Posts: 862
Joined: Sat Oct 18, 2008 8:40 pm
Location: Houston,Tx

Re: OUR SITES WERE HACKED!

Post by puppet » Mon Apr 05, 2010 12:28 pm

ahh nice

updated to 3.0.7

User avatar
RuLeS
Posts: 239
Joined: Sat Oct 25, 2008 7:28 pm
Location: california
Contact:

Re: OUR SITES WERE HACKED!

Post by RuLeS » Mon Apr 05, 2010 7:46 pm

contact clorox... to pay back... :lol:
Image
Image

User avatar
sammy
Site Admin
Posts: 6393
Joined: Sat Oct 18, 2008 12:16 am

Re: OUR SITES WERE HACKED!

Post by sammy » Mon Apr 05, 2010 9:15 pm

i have deleted the files that you claim as being compromised. but how will i
> know if they are all now safe ?
> i renamed my forum directories back to normal. all seems to be working fine.
> sammy
>

Dreamhost wrote:
A great tool to doubleckeck if there are any lingering problems can be
found online at http://unmaskparasites.com" onclick="window.open(this.href);return false;

I did my own scan for known backdoor shells and did not see any under
your file space
.


Glen,

--
- DreamHost Abuse/Security Team
- Terms of Service: http://www.dreamhost.com/tos.html" onclick="window.open(this.href);return false;
- Anti-Spam Policy: http://www.dreamhost.com/spam.html" onclick="window.open(this.href);return false;
- Abuse Center: http://abuse.dreamhost.com" onclick="window.open(this.href);return false;




looks like we're good to go! :D
sammy
Image

Post Reply

Return to “Counter-Strike! General cs topics!”

Who is online

Users browsing this forum: No registered users and 339 guests