PoLiX Posted March 19, 2011 Report Posted March 19, 2011 Well, tbh, not even a clue how they got in. The password for SSGN (ssgn.net domain and subdomains, and no that is not the actual username) is used NOWHERE else, and had numbers, chars, and special chars. Made the pass 10x harder now, and a lot longer. But brute force was on, so I dunno how they got in yet. Root reported no logins, server reported no brute force attempts, etc. But it seemed to be a bot moving through the ftp editing all index.* and login.*/auth.* type files. It'd add an iframe line, and knew the difference between html and php in how it added it and where it added it. The ip was 67.61.120.63 and located in Texarkana Arkansas. Soon as I changed the pass, the server locked it out for "brute force attempts" for having incorrect login. All should be good for now. Will keep you updated on what I find. Edit: I still haven't fixed Smong's site (toktok) or Quotes site. Will work on those tomorrow. FTP log shows they were only other subdomains hit besides Forums, Files, and Ticket sites. Quote
Cheese Posted March 19, 2011 Report Posted March 19, 2011 if it added an iframe at the very end of the file, trenchwars.org also got hit by the same thing recently Quote
JoWie Posted March 19, 2011 Report Posted March 19, 2011 Maybe they used an exploit in an old software package. I like to give every domain / subdomain different users to lessen such attacks. I use suPHP for this when they need to run php scripts. Quote
Dr Brain Posted March 19, 2011 Report Posted March 19, 2011 FTP sends passwords unencrypted. Do you use FTP at all, Polix? If so, then that could be the source of the problem. Quote
hallucination Posted March 19, 2011 Report Posted March 19, 2011 iFrame attack can be used for many purposes, but probably financial ones:http://www.networkworld.com/news/2008/031308-hackers-launch-massive-iframe.htmlI would not trust that IP location. FTP is a good question -- also there are exploits that look for commonly used FTP progs that store the pw and look there:http://www.thepicky.com/internet/how-hackers-viruses-steal-ftp-passwords/ That pw in a cookie somewhere? pw was obtained either by your machine being compromised in some way or by the pw being intercepted (e.g. clear text through a compromised router [ftp] or a man in the middle attack) or by password storage location being compromised (doubtful) -- other thoughts? --hallu Quote
PoLiX Posted March 19, 2011 Author Report Posted March 19, 2011 FTP sends passwords unencrypted. Do you use FTP at all, Polix? If so, then that could be the source of the problem. Started thinkin that was possible. It had been a while since I last logged in (Feb 09th according to log). Searching through the log though, noone else but me had logged in through that account until this. So wasn't even a "lets see if this works". edit: Scannin the hell out of my computer right now, and changing 1 other ftp login I had used in the past months. Quote
PoLiX Posted March 19, 2011 Author Report Posted March 19, 2011 After all the scans, nothing really turned up. Ran a couple different virus scanners (1 normal, and 1 deep scan), and an adaware scan. Then had Microsoft's program go over it again for the hell of it and the worst that turned up was 1 popup ad. Otherwise all that was ever detected was a few "trojans" in the update files from a recent java update. Trying to remember if anyone else ever had the password to the ftp. It used that user, though I deleted 2 other ftp accounts I setup for Sama and Mav to be safe. Baffeling... Stop using PHP. How was php a cause of this? edit: Guess I didn't state this was all done through ftp, so assuming you thought it was a php injection exploit. Quote
L.C. Posted March 19, 2011 Report Posted March 19, 2011 After all the scans, nothing really turned up. Ran a couple different virus scanners (1 normal, and 1 deep scan), and an adaware scan. Then had Microsoft's program go over it again for the hell of it and the worst that turned up was 1 popup ad. Otherwise all that was ever detected was a few "trojans" in the update files from a recent java update. Trying to remember if anyone else ever had the password to the ftp. It used that user, though I deleted 2 other ftp accounts I setup for Sama and Mav to be safe. Baffeling... Stop using PHP. How was php a cause of this? edit: Guess I didn't state this was all done through ftp, so assuming you thought it was a php injection exploit.http://technet.microsoft.com/en-us/sysinternals/bb897445 Does anything show up in the list? Quote
PoLiX Posted March 19, 2011 Author Report Posted March 19, 2011 32bit... Might of found a 64bit one. Quote
PoLiX Posted March 19, 2011 Author Report Posted March 19, 2011 Just Continuum.exe, few setup files from ssdl. Lol. Quote
Cheese Posted March 20, 2011 Report Posted March 20, 2011 edit: Guess I didn't state this was all done through ftp, so assuming you thought it was a php injection exploit. with the other one, that was the first thing i thought it wasthen i looked, and it appeared on pages where that was impossibleits almost 100% probable through ftp Quote
PoLiX Posted March 20, 2011 Author Report Posted March 20, 2011 Yeah. It used ftp to download, edit, and reupload the files. Gotta go through Quotes and TokTok still as I was 2x checking all the ssgn files I found in the ftp log to make sure none got missed. Quote
Samapico Posted March 20, 2011 Report Posted March 20, 2011 Sup everyone, just came back from a weekend away with my buddies... That sucks... Last time I used the FTP, it was on my old PC, which was reformatted since then Quote
Ninja Cat Posted April 3, 2011 Report Posted April 3, 2011 Lizamoon perhaps? http://www.ibtimes.com/articles/129843/20110402/lizamoon-websense-apple-itunes-security-trojan-malware-scareware-script-sql-injection-four-million-w.htm Quote
PoLiX Posted April 3, 2011 Author Report Posted April 3, 2011 Sounds reasonable. For how much scanning I did, it just seemed odd to turn up nothing. That and the directories it skipped on the webserver. Also the fact it was including an iframe in many index files. Quote
»Xog Posted April 10, 2011 Report Posted April 10, 2011 (edited) Well, tbh, not even a clue how they got in. The password for SSGN (ssgn.net domain and subdomains, and no that is not the actual username) is used NOWHERE else, and had numbers, chars, and special chars. Made the pass 10x harder now, and a lot longer. But brute force was on, so I dunno how they got in yet. Root reported no logins, server reported no brute force attempts, etc. But it seemed to be a bot moving through the ftp editing all index.* and login.*/auth.* type files. It'd add an iframe line, and knew the difference between html and php in how it added it and where it added it. The ip was 67.61.120.63 and located in Texarkana Arkansas. Soon as I changed the pass, the server locked it out for "brute force attempts" for having incorrect login. All should be good for now. Will keep you updated on what I find. Edit: I still haven't fixed Smong's site (toktok) or Quotes site. Will work on those tomorrow. FTP log shows they were only other subdomains hit besides Forums, Files, and Ticket sites. It looks like Cable One has had this net range for quite a few years now. whois report: NetRange: 67.60.0.0 - 67.61.255.255CIDR: 67.60.0.0/15OriginAS: AS11492NetName: CABLEONENetHandle: NET-67-60-0-0-1Parent: NET-67-0-0-0-0NetType: Direct AllocationRegDate: 2005-08-24Updated: 2007-12-10Ref: http://whois.arin.ne...NET-67-60-0-0-1 OrgName: CABLE ONE, INC.OrgId: CBL1Address: 1314 N THIRD STAddress: FIRST FLOORCity: PHOENIXStateProv: AZPostalCode: 85004Country: USRegDate: 1996-09-25Updated: 2008-10-29Ref: http://whois.arin.net/rest/org/CBL1 ---------------------------------------------------- whatismyip report: Hostname:67-61-120-63.cpe.cableone.netISP:CABLE ONEOrganization:CABLE ONEProxy:None detectedType:BroadbandAssignment:Static IPBlacklist:Geolocation InformationCountry:United States http://whatismyipaddress.com/images/flags/us.pngState/Region:ArkansasCity:TexarkanaLatitude:33.423Longitude:-93.8691Area Code:870Postal Code:71854 You should file a complaint with Cable One. Will likely only take a minute or two out of your day. their abuse email is abuse@cableone.net and their phone for abuse reporting is 1-877-692-2253http://whois.arin.net/rest/poc/COAD-ARIN.html Edited April 10, 2011 by Xog Quote
Cheese Posted April 10, 2011 Report Posted April 10, 2011 you should note that the isp is based at that location and state, but the user may be somewhere else Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.