[thelist] Hacked by kerem125
Chris Dempsey
evolt at cubeit.co.uk
Fri Feb 2 10:57:33 CST 2007
Thanks for the further details. Just to clarify it's not one of our hosts
or clients that is affected [although one of our directors happens to be on
the board of the company with the issue]. The owner of the website has
managed to contact their host and they are looking at this now.
I will look at this further when time allows for my own information.
Thanks again.
-----Original Message-----
From: thelist-bounces at lists.evolt.org
[mailto:thelist-bounces at lists.evolt.org] On Behalf Of Mark Groen
Sent: 02 February 2007 15:48
To: thelist at lists.evolt.org
Subject: Re: [thelist] Hacked by kerem125
On Friday 02 February 2007 06:36, Chris Dempsey wrote:
> Anyone seen this before or know of a way to identify exactly what has been
> compromised? I'm guessing that someone simply gained access via FTP and
> changed the default page.
In the past couple years the bot-net/trojan launched from a web page or in
an
attachment and the SQL-injection methods have been most popular, iirc. Don't
know what that dormant bot-net is going to do once it lets loose, but that's
another subject...
Another popular hack is to get an account at a web host, and attack
internally
with a kit that (rootkit for lack of a better term) exploits by prepending
or
appending to the file server's web page output, then either frames the
Cpanel, Plesk etc. (host's customer control panel) and snags passwords for
later use, or simply redirects to a "hah hah" page.
Which is what *may* be happenning here. The implication is that the host
provider may not be quite up to date, or is allowing the mod_layout (custom
Apache mod) to be inserted etc. etc. - after everything has settled down,
change your passwords (mixed cAsE plus at least one number, minimum) and
ensure all server input from site visitors is sanitized.
Check with the host and see if other sites are in the same boat, (use their
forum if they have one for example) if so, then it may not be your clients'
web site files that have a hole, but check anyways.
--
cheers,
mark
--
* * Please support the community that supports you. * *
http://evolt.org/help_support_evolt/
For unsubscribe and other options, including the Tip Harvester
and archives of thelist go to: http://lists.evolt.org
Workers of the Web, evolt !
More information about the thelist
mailing list