Forum Moderators: phranque
<!-- [73ef2dbab4182cfd5b0813178e93bbf2 --><!-- 8568250521 --><div style="overflow:auto; visibility:hidden; height: 1px; "><ul><li><a href="http://example./com/l">.</a></li></ul></div><!-- 73ef2dbab4182cfd5b0813178e93bbf2] -->
With similar links using PHP on other sites of his using the register_shutdown_function (linked again to http://example.com/l which isn't even a registered domain)
There were some random links left on another site linked to a folder called 'priv' on some random blokes site that had a replica of his front page in it - I called him up and he says he knows nothing about it.
I'm trying to get to the bottom of this so thought I'd start at this font of wisdom, so if you have any ideas pass them by me because I'm stumped,
Cheers,
Dom
[edited by: tedster at 3:32 am (utc) on Aug. 21, 2009]
[edit reason] hide the real domain name [/edit]
What matter most is the fix - not what particular urls were inserted. This particular payload looks like a further evolution of the old iframe insertion, but it is using a 1px height div instead of an iframe to cary the code.
What you need to nail down is how the server's security was breeched. and then plug up that security hole. This usually means patching/updating key software that's running that may have been allowed to slide. the most commmon software is usually what hackers target, because they want MASSES of zombie pages delivering their payload. So check out old versions of CPanel, Wordpress, VBulletin, and even php and mysql installs.
And once you patch the security, then upload clean versions of the pages from a local backup. If you don't do that, you may leave a trapdoor behind and the server will be hacked again.