Forum Moderators: DixonJones
My web site has been hit by a something with "site-check" as unique user-agent string :
88.151.#*$!.32 - - [04/Jul/2008:06:53:30 +0200] "GET /FCKeditor.2.3.2/qzdobvbjf.html HTTP/1.1" 404 246 "-" "site-check"
88.151.#*$!.31 - - [04/Jul/2008:06:53:32 +0200] "GET /IMG/flv/swhndyyvg.html HTTP/1.1" 404 246 "-" "site-check"
88.151.#*$!.36 - - [04/Jul/2008:06:53:33 +0200] "GET /FCKeditor.2.3.2/editor/skins/ccpdouxfk.html HTTP/1.1" 404 246 "-" "site-check"
88.151.#*$!.31 - - [04/Jul/2008:06:53:33 +0200] "GET /IMG/distant/png/vgakproac.html HTTP/1.1" 404 246 "-" "site-check"
IPs range from 88.151.#*$!.30 to 88.151.#*$!.37 and asks for machine-generated page names.
Ever heard of this bot?
Marino
[edited by: Receptional at 2:52 pm (utc) on July 14, 2008]
[edit reason] Had to take out the specific IP numbers [/edit]
My guess is that "site-check" is someone scanning your server to see if they can hack you...
Do you think one can use fckeditor from outside a CMS? Yes!
That was nasty. Each subdir would bear a .htaccess like :
Options -MultiViews
ErrorDocument 404 //FCKeditor.2.3.2/time.php
... and two PHP files (I've inserted spaces into the "eval" and "base64_decode" commands):
If you wanna know what's hidden in this, jsut replace the "eval" commands with some "print_r" and run the code on your local server. Digging in the code, you will find 4 includes with base 64 again. Desobfuscating them, you will find :
<snip: code dump removed>
http://example.users.***removed***.ru/?.0
http://example.users.***removed***/?.1
http2://example.users.***removed***.ru/?.2
http2://example.users.***removed***.ru/?.3
Ok, ok, ok... Russian mafia, again...
Let's go on. Trying to use the fck editor, I've found that the directories to which I used to upload images were no more available. They all had been replaced by... alink. Digging in the code, I've found that :
[...]
<td nowrap="nowrap">
<span id="eUploadMessage">Upload a new file in this folder</span><br><a href="http://www.example.com/example/editors/example.html" class=giepoaytr>example</a>
[...]
Ok again, the ***example*** company seems to be a clean firm. I sent them a mail to ask for any explanations.
Keying in Google "example" (with the double quote) in Google, I've found other infected web sites. I sent a mail to the webmasters to warn them.
Well, now I have to (try to) know where is the fault, and how I can solve it.
[edited by: engine at 2:09 pm (utc) on July 17, 2008]
[edit reason] code dump removed, and examplified [/edit]