| 
		
			
			
				
			
			
				 
			
			
				
			
		 | 
		
			
			
				 
			
				
			
		 | 
	||||
| 
				Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.  You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us.  | 
		
		 
		![]()  | 
	
		
			
  | 	
	
	
		
		|||||||
| Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. | 
| 
		 | 
	Thread Tools | 
| 
			
			 | 
		#1 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
			
			 Just as a warning for everyone, I had two old copies of comus on a Server with ~20 other Domains. Looks like some hacker managed to break in through comus to load up a script that simply added some malicious Java Script code to EVERY HTML and PHP file on my Server that have been set to 777 file permissions. So some of my Smart Thumbs copies have been affected, and even some of my old static HTML galleries. 
		
	
		
		
		
		
		
	
	As far as I know there isn't an security update from Comus available by now, so I simply had to delete my two old copies from the Server as it was too risky to keep them there. So if you have Comus on your Box watch it very closely or get rid of the installations.  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#2 | 
| 
			
			
			
			 Rock 'n Roll Baby! 
			
		
			
			
			Join Date: Sep 2004 
				Location: USA, temporarly 
				
				
					Posts: 22,562
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 How come that I didn't get any of this shit? Maybe my server security is too good? 
		
	
		
		
		
		
			
				__________________ 
		
		
		
		
	
	Sig for sale. Affordable prices. Contact me and get a great deal ;) My contact: ICQ: 944-320-46 e-mail: manca {AT} HotFreeSex4All.com  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#3 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#4 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Join Date: Aug 2008 
				
				
				
					Posts: 1,609
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 sometimes its always on the server side securities if you get hacked!!! 
		
	
		
		
		
		
			
				__________________ 
		
		
		
		
	
	LUSTY LIFES : Dad & Daughter Wild Adventures : Naughty Wild Sister Contact : ICQ : 372109 Email add: [email protected]  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#5 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Aug 2006 
				Location: Poland 
				
				
					Posts: 9,229
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Run a virus scan. Usually this stuff isn't caused by someone hacking your server or exploiting your script, but rather by a virus on your computer that logs in and puts this shit in. 
		
	
		
		
		
		
			
				__________________ 
		
		
		
		
	
	Mechanical Bunny Media Mechbunny Tube Script | Mechbunny Webcam Aggregator Script | Custom Web Development  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#6 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: Jul 2006 
				Location: NoHo 
				
				
					Posts: 5,970
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Just checked one of my old tgps (the only one that still had comus installed)......... yeap.... had to put a 302 htaccess redirect to one of my other sites... every thumb redirect was causing my antivirus to go on full alert... 
		
	
		
		
		
		
			
				__________________ 
		
		
		
		
	
	![]() ICQ: 266990876 
			 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#7 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Industry Role:  
				Join Date: May 2006 
				
				
				
					Posts: 4,665
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 There's been a few people hit wit this in the past few days  
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#8 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 It's definitely a Comus hack, in my case it was a php script that got executed every ~10 minutes through an external request from an IP in China. I've blocked the IP from my server and it was gone. Many other webmasters are affected too ATM, so this thread should basically a warning for others to have a close eye on their sites 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#9 | |
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 i.e. grep -R "function Sym1" * > list_of_infected_files Oh, and at first you might wanna try blocking the IP that calls for the script that put's that malicious Java Script code into your files iptables -A INPUT -s 122.70.145.151 -j DROP  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#10 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Apr 2006 
				Location: Germany 
				
				
					Posts: 4,323
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 You guys probably never followed the advice to chmod everything to 777.  
		
	
		
		
		
		
			![]() 
				__________________ 
		
		
		
		
	
	--- ICQ 14-76-98 <-- I don't use this at all  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#11 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Apr 2005 
				Location: Vegas 
				
				
					Posts: 4,499
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Fuccckkkkkkkkk this hack got me too.  I am deleting my old Comus install now but from what I understand even after you have deleted Comus there are a bunch more backdoors that have likely been installed on the server and have to be rooted out.  
		
	
		
		
		
		
			
				__________________ 
		
		
		
		
	
	бабки, шлюхи, сила  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#12 | 
| 
			
			
			
			 Registered User 
			
		
			
			
			Industry Role:  
				Join Date: Feb 2006 
				
				
				
					Posts: 22,511
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 guess that is the final nail in the coffin for comus. 
		
	
		
		
		
		
		
	
	wish the best. hacks suck.  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#13 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Dec 2006 
				Location: Along the shore. 
				
				
					Posts: 1,557
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 I am wondering if I delete all the comus installs, have my host load an old backup in and set the files to read only files, will that take care of things? 
		
	
		
		
		
		
		
	
	Anybody?  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#14 | ||
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: Sep 2003 
				
				
				
					Posts: 2,255
				 
				
				
				
				 | 
	
	
	
	
		
			
			 
				
				How to fix Comus hack.
			 
			1. Install mod_security. (will stop code injection and defend from web attack.) 
		
	
		
		
		
		
			2. Migrate Comus Thumbs to Smart Thumbs - export and import gals, set cron/templates/trades/secure.php/etc.. 3. Remove CT completely. 4. Find bad phpshell scripts(backdoor) that hacker installed into your server and remove them. Quote: 
	
 5. Find infected website files and edit/delete. Quote: 
	
 6. Repeat #4~#5. 7. Setup better security. change all server passwords(linux users/mysql users/web logins). install Rootkit Hunter. update APPs via yum(centOS). apache in suexec mode, use suphp, no 777 permission. use SFTP. update mod_security rules. install reliable anti-spyware to your local machine. 
				__________________ 
		
		
		
		
		
			
		
		
	
	254-282-542  | 
||
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#15 | |
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Did you check that the "696620287374" is the same in all backdoor files? Cause I think a "smart" hacker would use randomized files to ensure they're harder to detect 
		
	
		
		
		
		
		
	
	Quote: 
	
 P.S. I'd REALLY like to break some kneecaps today  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#16 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Bump Bump 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#17 | |||||
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: Sep 2003 
				
				
				
					Posts: 2,255
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 Here is the full php code: Quote: 
	
 Quote: 
	
 Quote: 
	
 or if you had installed mod_security, look into /var/log/httpd/modsec_debug.log. whatever code they have on file, mod_security blocks system calls via web. you will find a bunch of these logs : Quote: 
	
 And for infected web files, yes looks like the backdoors didn't inject the same js code. each code has different encrypted malware url. So classify all html/php files that have 777 permision then abstract those different codes and make your own grep strings for full search. Luckly, I had only one common string. 
				__________________ 
		
		
		
		
		
			
		
		
	
	254-282-542  | 
|||||
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#18 | |
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 So people search your servers: grep -R "6966202873" * > list_of_backdoor_files Oh, and the backdoor files are called "sync.php, thumbs.php and backup.php" in my case, user:group -> nobody:nobody  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#19 | 
| 
			
			
			
			 Clueless OleMan 
			
		
			
			
			Join Date: Mar 2003 
				Location: ICQ - 169903487 
				
				
					Posts: 11,009
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Anyone hear from Sixzeros or CT on what's up?? 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#20 | 
| 
			
			
			
			 emperor of my world 
			
		
			
			
			Join Date: Aug 2004 
				Location: nethalands 
				
				
					Posts: 29,903
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 how do i prevent this? ive got ct on a test site so it doesnt matter how, its not yet hacked. What files do i have to change from 777 to something else when i want to prevent it? 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#21 | |
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 So if you REALLY intend to keep your copy of CT you should at least ensure that NO files on your server are writable by the user "nobody", and maybe block the IP I've mentioned earlier in this thread from accessing your Server. Oh, and search for the strings given in this thread with grep, maybe you're already infected and just didn't recognize it by now....  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#22 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Just as a short summary how I got rid of this infection sofar 
		
	
		
		
		
		
		
		
			
		
		
	
	-At first block 122.70.145.151 from accessing your Server, it's an IP in China that triggers the backdoor files on YOUR Server every ~ 10 Minutes to infect writable files iptables -A INPUT -s 122.70.145.151 -j DROP And Spudstr from YellowFiber also suggestes to block 122.64.0.0/11 iptables -A INPUT -s 122.64.0.0/11 -j DROP - Then get rid of your Comus installations, I've simply deleted the entire /ct/ folder as I didn't use my installations anyway. That was the only solution for me as long as there's no security patch available - Next I've scanned my Server for for any INFECTED Files grep -R "function Sym1" * > list_of_infected_files grep -R "function STy6" * > another_list_of_infected_files These are the only two different types of insertions I've found sofar on my Server, might be possibble that there are more out there, please let us know if you come across new ones so everybody could search their Server for the matching string snippets. - And finally get rid of the backdoor files: grep -R "6966202873" * > list_of_backdoor_files The backdoor files on my Server where called something like backup.php, sync.php, thumbs.php I hope that's it sofar, now it's time to tighten Server Security a bit more  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#23 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Join Date: Dec 2001 
				Location: The Great USA 
				
				
					Posts: 1,632
				 
				
				
				
				 | 
	
	|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#24 | 
| 
			
			
			
			 emperor of my world 
			
		
			
			
			Join Date: Aug 2004 
				Location: nethalands 
				
				
					Posts: 29,903
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 im no server expert so i just deleted it all. 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#25 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: May 2002 
				Location: European Union 
				
				
					Posts: 3,815
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Bump Bump 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#26 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Oct 2006 
				Location: SWFL 
				
				
					Posts: 4,533
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 add me to the list ...  
		
	
		
		
		
		
			fuck.. had noticed a few sites of mine with trojans on it a little over a week ago but was on the road and couldn't do much about it.. (the list is now up to 14 sites that have had code added to them).. narrowed it down to assuming it was the one site that i use Comus on as being the soruce of the problems and then searched GFY for Comus to confirm others were having an issue... and here we are... looks like i'll be killing it as Comus has no update, and going to their site to redownload a frsh copy to make sure i had the latest version just gives an error... on this one server i probably have 200-300 sites.. i'm sure that there's more than 14 infected.. looks like i am going to have dun today.. 
				__________________ 
		
		
		
		
	
	400 HARDL1NKS only $117! - (100 for $45) 
			BL0G P0STS $1.85+ | 55,000 Word Comprehensive Synonym Database 2 REVIEW COPIES AVAIL AT 50% OFF! | 16 yr old Aged Domains 4Sale ICQ: 265-593-735 ~ Skype: Naughty-Pages ~ email: ez_money4u(at)comcast(dot)net  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#27 | 
| 
			
			
			
			 scriptmaster 
			
		
			
				
			
			
			Industry Role:  
				Join Date: May 2006 
				Location: Serbia 
				
				
					Posts: 5,237
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 good info thatnks 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#28 | 
| 
			
			
			
			 So Fucking Banned 
			
		
			
			
			Join Date: Dec 2008 
				Location: Prescott, AZ 
				
				
					Posts: 2,158
				 
				
				
				
				 | 
	
	|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#29 | 
| 
			
			
			
			 GFY HALL OF FAME DAMMIT!!! 
			
		
			
				
			
			
			Join Date: Jan 2002 
				Location: that 504 
				
				
					Posts: 60,840
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 same. had it sitting on a site, and just hit delete on the CT dir. 
		
	
		
		
		
		
			lol 
				__________________ 
		
		
		
		
	
	![]() Want an Android App for your tube, membership, or free site? Need banners or promo material? Hit us up (ICQ Fletch: 148841377) or email me fletchxxx at gmail.com -  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#30 | |
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Oct 2006 
				Location: SWFL 
				
				
					Posts: 4,533
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 Looking through your post history, it's apparent you are a troll.. and your posts have nothing of value whatsoever.. Looking through the past couple weeks of your posts I can only assume you are not even a webmaster.. just really dumb shit.. more info is here: http://www.gofuckyourself.com/showthread.php?t=931492 please ignore the troll with the avatar of his boyfriend.. 
				__________________ 
		
		
		
		
		
			
		
		
	
	400 HARDL1NKS only $117! - (100 for $45) 
			BL0G P0STS $1.85+ | 55,000 Word Comprehensive Synonym Database 2 REVIEW COPIES AVAIL AT 50% OFF! | 16 yr old Aged Domains 4Sale ICQ: 265-593-735 ~ Skype: Naughty-Pages ~ email: ez_money4u(at)comcast(dot)net  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#31 | 
| 
			
			
			
			 Too lazy to set a custom title 
			
		
			
				
			
			
			Join Date: Jun 2004 
				Location: Brasil 
				
				
					Posts: 15,778
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 I had the same issue... and got about 20 or 30 sites hacked because of CT... I have removed all CT's I had... and redirected those domains to some CAM sites... 
		
	
		
		
		
		
			
				__________________ 
		
		
		
		
	
	Do you need cheap, fast and reliable porn website hosting? Host Head is the way to go!! Asian Gay Special | Live on MSN - Live Webcam Chat | Live Adult Webcam Performances | MY SWEET BLACKS LIVE ON CAM Pukka Tranny | Tattooed Shemales | She's A He | Menu Porno | Porn Performances | All Chubby MY ICQ# 169833797  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#32 | |
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Oct 2006 
				Location: SWFL 
				
				
					Posts: 4,533
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 We interrupt this thread for a public GFY announcement: Carmine Raguso is the OFFICIAL WINNER of the GFY Troll of the Week award!!! yup.. he won.. 
				__________________ 
		
		
		
		
		
			
		
		
	
	400 HARDL1NKS only $117! - (100 for $45) 
			BL0G P0STS $1.85+ | 55,000 Word Comprehensive Synonym Database 2 REVIEW COPIES AVAIL AT 50% OFF! | 16 yr old Aged Domains 4Sale ICQ: 265-593-735 ~ Skype: Naughty-Pages ~ email: ez_money4u(at)comcast(dot)net  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#33 | |
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Join Date: Feb 2003 
				Location: Dreamland 
				
				
					Posts: 1,685
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 Is this all done through SSH? 
				__________________ 
		
		
		
		
	
	HaHaHa  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 |