![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
![]() Just as a warning for everyone, I had two old copies of comus on a Server with ~20 other Domains. Looks like some hacker managed to break in through comus to load up a script that simply added some malicious Java Script code to EVERY HTML and PHP file on my Server that have been set to 777 file permissions. So some of my Smart Thumbs copies have been affected, and even some of my old static HTML galleries.
As far as I know there isn't an security update from Comus available by now, so I simply had to delete my two old copies from the Server as it was too risky to keep them there. So if you have Comus on your Box watch it very closely or get rid of the installations. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Rock 'n Roll Baby!
Join Date: Sep 2004
Location: USA, temporarly
Posts: 22,562
|
How come that I didn't get any of this shit? Maybe my server security is too good?
__________________
Sig for sale. Affordable prices. Contact me and get a great deal ;) My contact: ICQ: 944-320-46 e-mail: manca {AT} HotFreeSex4All.com |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Confirmed User
Join Date: Aug 2008
Posts: 1,609
|
sometimes its always on the server side securities if you get hacked!!!
__________________
LUSTY LIFES : Dad & Daughter Wild Adventures : Naughty Wild Sister Contact : ICQ : 372109 Email add: [email protected] |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
Confirmed User
Industry Role:
Join Date: Aug 2006
Location: Poland
Posts: 9,228
|
Run a virus scan. Usually this stuff isn't caused by someone hacking your server or exploiting your script, but rather by a virus on your computer that logs in and puts this shit in.
__________________
Mechanical Bunny Media Mechbunny Tube Script | Mechbunny Webcam Aggregator Script | Custom Web Development |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 |
Confirmed User
Join Date: Jul 2006
Location: NoHo
Posts: 5,970
|
Just checked one of my old tgps (the only one that still had comus installed)......... yeap.... had to put a 302 htaccess redirect to one of my other sites... every thumb redirect was causing my antivirus to go on full alert...
__________________
![]() ICQ: 266990876
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
Confirmed User
Industry Role:
Join Date: May 2006
Posts: 4,665
|
There's been a few people hit wit this in the past few days
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
It's definitely a Comus hack, in my case it was a php script that got executed every ~10 minutes through an external request from an IP in China. I've blocked the IP from my server and it was gone. Many other webmasters are affected too ATM, so this thread should basically a warning for others to have a close eye on their sites
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 | |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
Quote:
i.e. grep -R "function Sym1" * > list_of_infected_files Oh, and at first you might wanna try blocking the IP that calls for the script that put's that malicious Java Script code into your files iptables -A INPUT -s 122.70.145.151 -j DROP |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 |
Confirmed User
Industry Role:
Join Date: Apr 2006
Location: Germany
Posts: 4,323
|
You guys probably never followed the advice to chmod everything to 777.
![]()
__________________
--- ICQ 14-76-98 <-- I don't use this at all |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#11 |
Confirmed User
Industry Role:
Join Date: Apr 2005
Location: Vegas
Posts: 4,499
|
Fuccckkkkkkkkk this hack got me too. I am deleting my old Comus install now but from what I understand even after you have deleted Comus there are a bunch more backdoors that have likely been installed on the server and have to be rooted out.
![]()
__________________
бабки, шлюхи, сила |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#12 |
Registered User
Industry Role:
Join Date: Feb 2006
Posts: 22,511
|
guess that is the final nail in the coffin for comus.
wish the best. hacks suck. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#13 |
Confirmed User
Industry Role:
Join Date: Dec 2006
Location: Along the shore.
Posts: 1,557
|
I am wondering if I delete all the comus installs, have my host load an old backup in and set the files to read only files, will that take care of things?
Anybody? |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#14 | ||
Confirmed User
Join Date: Sep 2003
Posts: 2,255
|
How to fix Comus hack.
1. Install mod_security. (will stop code injection and defend from web attack.)
2. Migrate Comus Thumbs to Smart Thumbs - export and import gals, set cron/templates/trades/secure.php/etc.. 3. Remove CT completely. 4. Find bad phpshell scripts(backdoor) that hacker installed into your server and remove them. Quote:
5. Find infected website files and edit/delete. Quote:
6. Repeat #4~#5. 7. Setup better security. change all server passwords(linux users/mysql users/web logins). install Rootkit Hunter. update APPs via yum(centOS). apache in suexec mode, use suphp, no 777 permission. use SFTP. update mod_security rules. install reliable anti-spyware to your local machine.
__________________
254-282-542 |
||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#15 | |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
Did you check that the "696620287374" is the same in all backdoor files? Cause I think a "smart" hacker would use randomized files to ensure they're harder to detect
Quote:
P.S. I'd REALLY like to break some kneecaps today ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#16 |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
Bump Bump
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#17 | |||||
Confirmed User
Join Date: Sep 2003
Posts: 2,255
|
Quote:
Here is the full php code: Quote:
Quote:
Quote:
or if you had installed mod_security, look into /var/log/httpd/modsec_debug.log. whatever code they have on file, mod_security blocks system calls via web. you will find a bunch of these logs : Quote:
And for infected web files, yes looks like the backdoors didn't inject the same js code. each code has different encrypted malware url. So classify all html/php files that have 777 permision then abstract those different codes and make your own grep strings for full search. Luckly, I had only one common string.
__________________
254-282-542 |
|||||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#18 | |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
Quote:
So people search your servers: grep -R "6966202873" * > list_of_backdoor_files ![]() Oh, and the backdoor files are called "sync.php, thumbs.php and backup.php" in my case, user:group -> nobody:nobody |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#19 |
Clueless OleMan
Join Date: Mar 2003
Location: ICQ - 169903487
Posts: 11,009
|
Anyone hear from Sixzeros or CT on what's up??
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#20 |
emperor of my world
Join Date: Aug 2004
Location: nethalands
Posts: 29,903
|
how do i prevent this? ive got ct on a test site so it doesnt matter how, its not yet hacked. What files do i have to change from 777 to something else when i want to prevent it?
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#21 | |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
Quote:
So if you REALLY intend to keep your copy of CT you should at least ensure that NO files on your server are writable by the user "nobody", and maybe block the IP I've mentioned earlier in this thread from accessing your Server. Oh, and search for the strings given in this thread with grep, maybe you're already infected and just didn't recognize it by now.... |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#22 |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
Just as a short summary how I got rid of this infection sofar
-At first block 122.70.145.151 from accessing your Server, it's an IP in China that triggers the backdoor files on YOUR Server every ~ 10 Minutes to infect writable files iptables -A INPUT -s 122.70.145.151 -j DROP And Spudstr from YellowFiber also suggestes to block 122.64.0.0/11 iptables -A INPUT -s 122.64.0.0/11 -j DROP - Then get rid of your Comus installations, I've simply deleted the entire /ct/ folder as I didn't use my installations anyway. That was the only solution for me as long as there's no security patch available - Next I've scanned my Server for for any INFECTED Files grep -R "function Sym1" * > list_of_infected_files grep -R "function STy6" * > another_list_of_infected_files These are the only two different types of insertions I've found sofar on my Server, might be possibble that there are more out there, please let us know if you come across new ones so everybody could search their Server for the matching string snippets. - And finally get rid of the backdoor files: grep -R "6966202873" * > list_of_backdoor_files The backdoor files on my Server where called something like backup.php, sync.php, thumbs.php I hope that's it sofar, now it's time to tighten Server Security a bit more ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#23 |
Confirmed User
Join Date: Dec 2001
Location: The Great USA
Posts: 1,632
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#24 |
emperor of my world
Join Date: Aug 2004
Location: nethalands
Posts: 29,903
|
im no server expert so i just deleted it all.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#25 |
Confirmed User
Join Date: May 2002
Location: European Union
Posts: 3,815
|
Bump Bump
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#26 |
Confirmed User
Industry Role:
Join Date: Oct 2006
Location: SWFL
Posts: 4,533
|
add me to the list ...
fuck.. had noticed a few sites of mine with trojans on it a little over a week ago but was on the road and couldn't do much about it.. (the list is now up to 14 sites that have had code added to them).. narrowed it down to assuming it was the one site that i use Comus on as being the soruce of the problems and then searched GFY for Comus to confirm others were having an issue... and here we are... looks like i'll be killing it as Comus has no update, and going to their site to redownload a frsh copy to make sure i had the latest version just gives an error... on this one server i probably have 200-300 sites.. i'm sure that there's more than 14 infected.. looks like i am going to have dun today..
__________________
400 HARDL1NKS only $117! - (100 for $45)
BL0G P0STS $1.85+ | 55,000 Word Comprehensive Synonym Database 2 REVIEW COPIES AVAIL AT 50% OFF! | 16 yr old Aged Domains 4Sale ICQ: 265-593-735 ~ Skype: Naughty-Pages ~ email: ez_money4u(at)comcast(dot)net |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#27 |
scriptmaster
Industry Role:
Join Date: May 2006
Location: Serbia
Posts: 5,237
|
good info thatnks
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#28 |
So Fucking Banned
Join Date: Dec 2008
Location: Prescott, AZ
Posts: 2,158
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#29 |
GFY HALL OF FAME DAMMIT!!!
Join Date: Jan 2002
Location: that 504
Posts: 60,840
|
same. had it sitting on a site, and just hit delete on the CT dir.
lol
__________________
![]() Want an Android App for your tube, membership, or free site? Need banners or promo material? Hit us up (ICQ Fletch: 148841377) or email me fletchxxx at gmail.com - ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#30 | |
Confirmed User
Industry Role:
Join Date: Oct 2006
Location: SWFL
Posts: 4,533
|
Quote:
![]() Looking through your post history, it's apparent you are a troll.. and your posts have nothing of value whatsoever.. Looking through the past couple weeks of your posts I can only assume you are not even a webmaster.. just really dumb shit.. more info is here: http://www.gofuckyourself.com/showthread.php?t=931492 please ignore the troll with the avatar of his boyfriend..
__________________
400 HARDL1NKS only $117! - (100 for $45)
BL0G P0STS $1.85+ | 55,000 Word Comprehensive Synonym Database 2 REVIEW COPIES AVAIL AT 50% OFF! | 16 yr old Aged Domains 4Sale ICQ: 265-593-735 ~ Skype: Naughty-Pages ~ email: ez_money4u(at)comcast(dot)net |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#31 |
Too lazy to set a custom title
Join Date: Jun 2004
Location: Brasil
Posts: 15,778
|
I had the same issue... and got about 20 or 30 sites hacked because of CT... I have removed all CT's I had... and redirected those domains to some CAM sites...
__________________
Do you need cheap, fast and reliable porn website hosting? Host Head is the way to go!! Asian Gay Special | Live on MSN - Live Webcam Chat | Live Adult Webcam Performances | MY SWEET BLACKS LIVE ON CAM Pukka Tranny | Tattooed Shemales | She's A He | Menu Porno | Porn Performances | All Chubby MY ICQ# 169833797 |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#32 | |
Confirmed User
Industry Role:
Join Date: Oct 2006
Location: SWFL
Posts: 4,533
|
Quote:
We interrupt this thread for a public GFY announcement: Carmine Raguso is the OFFICIAL WINNER of the GFY Troll of the Week award!!! yup.. he won..
__________________
400 HARDL1NKS only $117! - (100 for $45)
BL0G P0STS $1.85+ | 55,000 Word Comprehensive Synonym Database 2 REVIEW COPIES AVAIL AT 50% OFF! | 16 yr old Aged Domains 4Sale ICQ: 265-593-735 ~ Skype: Naughty-Pages ~ email: ez_money4u(at)comcast(dot)net |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#33 | |
Confirmed User
Join Date: Feb 2003
Location: Dreamland
Posts: 1,685
|
Quote:
Is this all done through SSH?
__________________
HaHaHa |
|
![]() |
![]() ![]() ![]() ![]() ![]() |