Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 07-12-2015, 01:23 AM   #1
grzepa
Confirmed User
 
Join Date: Jul 2004
Posts: 1,207
Malware removal service

There must be some vulnerability in the server I use or I don't know what's the cause, but my sites are being flagged with google malware warning. I also see some nasty .php files being randomly added to some of my websites. Both wordpress and plain html.

Any of you guys know of a reliable service that'll clean this shit for me and patch the vulnerabilty so it won't happen in the future ?
__________________
Like X-ART !!
grzepa is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 01:45 AM   #2
247mg
Yellowplum / 247mg
 
247mg's Avatar
 
Industry Role:
Join Date: Feb 2008
Location: Nicosia, CY
Posts: 2,161
Tpl files in wp ate mostly infected with this which finally effect html files or php files...you need to contact host to clear this for you... Its called injection....
__________________
247mg.com - Indian Affiliate Program - Over 50+ Sites To Promote - Monetize Your INDIAN Traffic Today!
247mg is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 01:48 AM   #3
grzepa
Confirmed User
 
Join Date: Jul 2004
Posts: 1,207
This makes sense, unfortunately my host , I won't name it here, is not so good at doing anything more complicated. You think I should push them to get this done ?
__________________
Like X-ART !!
grzepa is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 03:16 AM   #4
MiamiBoyz
fgfdftre6
 
Industry Role:
Join Date: Oct 2012
Location: In the closet with your dad!
Posts: 6,690
Quote:
Originally Posted by grzepa View Post
This makes sense, unfortunately my host , I won't name it here, is not so good at doing anything more complicated. You think I should push them to get this done ?
Sounds like you are lucky if those fuckers just manage too keep the server plugged in!
MiamiBoyz is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 05:28 AM   #5
AdultKing
Raise Your Weapon
 
AdultKing's Avatar
 
Industry Role:
Join Date: Jun 2003
Location: Outback Australia
Posts: 15,601
Quote:
Originally Posted by grzepa View Post
This makes sense, unfortunately my host , I won't name it here, is not so good at doing anything more complicated. You think I should push them to get this done ?
If you can't secure your own sites on your current host then perhaps you need to change hosting ?
AdultKing is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 05:37 AM   #6
Paul&John
Confirmed User
 
Paul&John's Avatar
 
Industry Role:
Join Date: Aug 2005
Location: YUROP
Posts: 8,606
Maybe your ftp password got stolen (in case you had stored it in Total Commander or similar) via a malware?
__________________
Use coupon 'pauljohn' for a $1 discount at already super cheap NameSilo!
Anal Webcams | Kinky Trans Cams Live | Hotwife XXX Tube | Get your Proxies here
Paul&John is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 06:30 AM   #7
Barry-xlovecam
It's 42
 
Industry Role:
Join Date: Jun 2010
Location: Global
Posts: 18,083
Sloppy PHP coding -- use PDO

Inputing user submitted data the right way:
PHP: PDO - Manual

This is probably beyond the scope of your abilities but the developers creating the code for your API should know better.

This is a nice blog article in more layman terms:
a2z notes: Introduction to PDO

Here is a long read on the SQL injection vulnerabilities in PHP query language.
mysql - How can I prevent SQL-injection in PHP? - Stack Overflow
Barry-xlovecam is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 06:44 AM   #8
Babaganoosh
♥♥♥ Likes Hugs ♥♥♥
 
Babaganoosh's Avatar
 
Industry Role:
Join Date: Nov 2001
Location: /home
Posts: 15,841
ProntoAdmin | On Demand Server Administration

Hosts aren't really responsible for your content. Some might be willing to help but when there is a recurring problem, most of them are going to tell you to get it figured out or they are going to shut you down.
__________________
I like pie.
Babaganoosh is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 07:51 AM   #9
Va2k
I’m still alive barley.
 
Va2k's Avatar
 
Industry Role:
Join Date: Oct 2001
Location: Va
Posts: 10,060
Quote:
Originally Posted by Babaganoosh View Post
ProntoAdmin | On Demand Server Administration

Hosts aren't really responsible for your content. Some might be willing to help but when there is a recurring problem, most of them are going to tell you to get it figured out or they are going to shut you down.
Not true, if it is a managed server then they are responsible to a point! Most if not all host who sell managed servers will do this for you free of charge unless there has to be custom scripting done. If your host has you on a managed plan and wont help, it is time to get rid of them right now!

Tom
__________________
Va2k is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 08:02 AM   #10
Babaganoosh
♥♥♥ Likes Hugs ♥♥♥
 
Babaganoosh's Avatar
 
Industry Role:
Join Date: Nov 2001
Location: /home
Posts: 15,841
Quote:
Originally Posted by Va2k View Post
Not true, if it is a managed server then they are responsible to a point! Most if not all host who sell managed servers will do this for you free of charge unless there has to be custom scripting done. If your host has you on a managed plan and wont help, it is time to get rid of them right now!

Tom
Better check that host's scope of support. If it's managed, they might run clamav or just grep for the common base64/eval or iframe fuckery but hosts (managed or not) should not be touching customer code...ever.

If there were malicious files found somewhere, deleting them isn't going to make much difference. They will just keep returning until whatever allowed them to be uploaded is fixed. Most of the time it's a vulnerable WP theme or plugin and in that case, it's absolutely not something the host should be messing with. A lot of fledgling hosting companies will do this but those are typically the ones who haven't had a lesson in liability yet.
__________________
I like pie.
Babaganoosh is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 08:23 AM   #11
247mg
Yellowplum / 247mg
 
247mg's Avatar
 
Industry Role:
Join Date: Feb 2008
Location: Nicosia, CY
Posts: 2,161
Quote:
Originally Posted by grzepa View Post
This makes sense, unfortunately my host , I won't name it here, is not so good at doing anything more complicated. You think I should push them to get this done ?
We face the same issue and host tech created script to remove all injection in tpl file codes and it works.... Our host - Amerinoc 😎
__________________
247mg.com - Indian Affiliate Program - Over 50+ Sites To Promote - Monetize Your INDIAN Traffic Today!
247mg is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 08:36 AM   #12
JuicyBunny
So Fucking Banned
 
Industry Role:
Join Date: Jun 2010
Location: Tokyo Red Light District
Posts: 2,145
Quote:
Originally Posted by 247mg View Post
We face the same issue and host tech created script to remove all injection in tpl file codes and it works.... Our host - Amerinoc 😎
Amerinoc +100
JuicyBunny is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 12:29 PM   #13
myleene
Confirmed User
 
Industry Role:
Join Date: Oct 2013
Location: Canada
Posts: 890
I could check it for you. Email me or contact me on ICQ.

I could do it live with you on TeamViewer or a similar tool.

Don't trust anybody requesting ssh, ftp or admin access to your server without you monitoring their actions and them giving you a full report... It'll probably get you in more trouble than you're in.
myleene is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 12:33 PM   #14
myleene
Confirmed User
 
Industry Role:
Join Date: Oct 2013
Location: Canada
Posts: 890
Quote:
Originally Posted by Babaganoosh View Post
Better check that host's scope of support. If it's managed, they might run clamav or just grep for the common base64/eval or iframe fuckery but hosts (managed or not) should not be touching customer code...ever.

If there were malicious files found somewhere, deleting them isn't going to make much difference. They will just keep returning until whatever allowed them to be uploaded is fixed. Most of the time it's a vulnerable WP theme or plugin and in that case, it's absolutely not something the host should be messing with. A lot of fledgling hosting companies will do this but those are typically the ones who haven't had a lesson in liability yet.
Exactly. Support ends on customer code.

They may change hardware, monitor system updates, install scripts, but I would never expect them to work on client code without compensation. If they do, you're probably paying too much for hosting monthly.
myleene is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-12-2015, 12:52 PM   #15
hdbuilder
Confirmed User
 
hdbuilder's Avatar
 
Industry Role:
Join Date: Jun 2012
Location: Canada
Posts: 1,338
It usually comes all from a single php file that reupload the bad files you see when you delete them and reinsert nasty codes into your html files.

Open one of your site and look at the source code of the page, check it without javascript enabled if your afraid of getting a virus, find an include which don't belong there, if it's encoded with eval (most of the time), decode it here HTML & JavaScript Encoder/Decoder.

Then look at the path of the php include file inside that code. Find that file and delete it (its the main file). Then run ComboFix on your computer to make sure you don't have any backdoor virus. That you got while watching porn

Then change your FTP, Cpanel (whatever), root password for your server.

Got those a few times and this is how i got ride of them...
hdbuilder is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-13-2015, 12:20 AM   #16
Paz
Confirmed User
 
Paz's Avatar
 
Industry Role:
Join Date: Jun 2012
Posts: 457
I had lots of malware problems years ago on shared hosting, always WordPress. I spent many hours fixing it only to have them back in via a back door, but as a quick and dirty fix most (WP) problems disappear if you disable the php eval function.
Paz is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-13-2015, 01:56 AM   #17
Va2k
I’m still alive barley.
 
Va2k's Avatar
 
Industry Role:
Join Date: Oct 2001
Location: Va
Posts: 10,060
Quote:
Originally Posted by Babaganoosh View Post
Better check that host's scope of support. If it's managed, they might run clamav or just grep for the common base64/eval or iframe fuckery but hosts (managed or not) should not be touching customer code...ever.

If there were malicious files found somewhere, deleting them isn't going to make much difference. They will just keep returning until whatever allowed them to be uploaded is fixed. Most of the time it's a vulnerable WP theme or plugin and in that case, it's absolutely not something the host should be messing with. A lot of fledgling hosting companies will do this but those are typically the ones who haven't had a lesson in liability yet.
What I was talking about was if a host offers managed servers and client request help then most GOOD host will do what they can for their client. I agree NO host should be allowed to just go into someone's site and fuck around with files without being asked. Each to their own on this.
__________________
Va2k is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks

Tags
service, malware, guys, plain, websites, wordpress, reliable, html, shit, happen, future, vulnerabilty, patch, clean, thatll, nasty, server, vulnerability, removal, sites, .php, files, randomly, added, warning



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.