Forum Moderators: phranque
<div style="overflow:auto; visibility:hidden; height: 1px; "
which then showed <snip>adult</snip> links that pointed to a page at duke example.edu/images...
Zone H online says something about this being a "Defacer S4P0" but they say nothing about preventing it again...
I called my host and they are looking into it but it is a shared host so I am sure it is some security loophole on their side. This is also an .asp site so maybe it is my code. Does anyone have any ideas on what to do about this to prevent it from happening again?
[edited by: trillianjedi at 4:22 pm (utc) on Mar. 1, 2007]
[edit reason] We don't need specifics, thanks ;) [/edit]
Well, my advice is find a ftp that provides more security. This means from what i've read that it should provide a pretty good level of encription. I think i read that some are only lightly encripted and passwords can be stolen easily. Also, it is a good idea to change your password to your site often. I personally change my password every time i finish using ftp.
Hope this helps:)
Good Luck tictoc:)
frenzy77
If your host's server can handle it I would suggest you begin connecting with a secure protocol. Then change all of your usernames and passwords for the account.
I'm not sure if it would catch the type of hack you mentioned though.
Just a paranoid thought - I'd check the workstations you are using to make sure they aren't hacked or have some type of spyware/keystroke recorder.
cg
Fact is:
1. download all your files and check the code in it
2. check for rootkits and other disgusting worms or trojans
3. apply maximum security settings on all your files, tightened PHP (if PHP) capabilities.
Last resort: hire a Bruce Lee type of server administrator that will trace back the hack and make sure the kid who did this doesn't come back.
If they installed a back door for themselves, even changing your password isn't going to help until you've cleaned up your site.
Examine your entire site for files you didn't put there or pages that show modified dates more recent than they should be. If that's too much trouble, delete the site and republish it.
Once the site is clean, change your password. Use a strong one. It MUST NOT be a single word that is in any human language dictionary.
If you use third party scripts for anything, including bulletin boards and image galleries, check the versions and make sure you are using the latest one(s). This is critically important. These types of hacks (if the same as reported elsewhere) are not done by a person browsing the web. An automated crawler seeks exploitable pages and automatically installs the exploit. Your page is downloaded, edited, and re-uploaded seconds later. The point is, there is no safety margin of time. If you have exploitable pages, exploit crawlers will find them just as surely as Googlebot will eventually find your pages.
If you write your own scripts, it can be a serious security hole unless you know how to write with security in mind. Guard against injection attacks. All input that comes from users (or from anywhere outside your site's internal code), especially if it is to be used in a database query, must be cleaned and checked for potential exploit code before being used.
Someone intercepting your password while you publish with FTP or otherwise is one of the least likely scenarios. Sure it's possible; it's just unlikely.
If you're on a shared server, it's possible that someone got server-wide access by exploiting someone else's vulnerable site. There's not much you can do about that, except...
If your host has a user-to-user forum, report the hack there to find out if others have been hit. Compare details.
If it is widespread, maybe your hosting company can block the hacker IP address(es) using their firewall.
Even if they can't do that, enable your site access logs and review them. If you can identify accesses that look suspicious around the time of the hack (if you've been archiving your logs), you can ban their IP address(es) in your .htaccess file (if on Apache).
Anyway, hope some of this helps. It is important to find the security hole, wherever it is, and close it. Else they'll be back.
[edited by: SteveWh at 12:45 am (utc) on Mar. 8, 2007]
you seem to have a good understanding of this situation.
When I said a kid...it was a joke of course.
I faced the issue not so long ago and I admit that it drove me nuts, I could not find where the security hole was, neither did my hosting nor a security consultant.
The weirdest thing is that it attacks also static pages.
I am not sure how this hwole thing works but if someone has more info about:
- which commonware is vulnerable to such things particularly
- how to detect these exploits
- how to detect the spam crawler
...would be great to spread the info and conter measures.
...
When I said a kid...it was a joke of course.
I faced the issue not so long ago and I admit that it drove me nuts, I could not find where the security hole was, neither did my hosting nor a security consultant.
It could also be a disgruntled employee at the host, probably the least likely scenario. No, there is at least one more less likely!: an employee who went to work for the hosting company with the goal of stealing passwords and corrupting servers.
Another avenue into a site that is apparently very common is that people use incredibly bad passwords and their sites get hacked by dictionary attacks. So use strong passwords. If you don't know what one looks like, go here: [grc.com...]
The weirdest thing is that it attacks also static pages.
- which commonware is vulnerable to such things particularly
Most developers of such scripts (at least the larger ones) promptly release updated versions to address security vulnerabilities that have been found. Anyone who uses popular third party scripts like Coppermine, Wordpress, SMF, vBulletin, phpBB, etc., should make sure that they're on a mailing list (if available) where updated versions are announced, or make frequent visits to forums where updates are announced and discussed. When a new version comes out, install it without delay.
There are also automated crawlers that probe sites for vulnerabilities to injection attacks via php, cgi, etc. if you develop your own scripts, it is important that you avoid using potentially insecure features of your chosen language until you have studied and understand how to code as securely as possible.
- how to detect these exploits
2. You could use an automated procedure to check the time and date stamps on your site files once a month or so. Bit of a hassle, though, especially since you are unlikely ever to find any problem.
- how to detect the spam crawler
I know of at least one case where the actual ftp attack was logged to the site FTP log(!), complete with the IP address of the party that did it.
[edited by: SteveWh at 2:37 am (utc) on Mar. 9, 2007]