Forum compromised

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • stuarttunstall
    Senior Member
    • Feb 2004
    • 403
    • 4.2.X

    [Forum] Forum compromised

    Hi

    Needs some advise... This afternoon I recieved an email telling me I had requested a password reset, which I had not... I then found one of my old admin accounts was logged in, which I promptly deleted..

    I have now found 2 files, usermain.php which is a definate hack, and phpinfo.php.. which I have now deleted...

    It looks like it gets passwords and usernames.. How could this get uploaded? and what should I do now?

    I have changed my password and blocked the IP within vB and the server firewall, which I also found it had been added as an allow IP.. no idea how they accessed without a password

    Stuart
  • Mark.B
    vBulletin Support
    • Feb 2004
    • 24275
    • 6.0.X

    #2
    This sounds ike the server has been compromised in some way.

    What version of vBulletin are you running?
    MARK.B
    vBulletin Support
    ------------
    My Unofficial vBulletin 6.0.0 Demo: https://www.talknewsuk.com
    My Unofficial vBulletin Cloud Demo: https://www.adminammo.com

    Comment

    • stuarttunstall
      Senior Member
      • Feb 2004
      • 403
      • 4.2.X

      #3
      That is what I thought.. looking at the logs 3 usernames were looked at all mine, 2 now removed and passwords changed... I have found upload logs for both files in CPanel.. so I think that is how they did it, not sure if banning the IP at server level and vBulletin level will help?

      I am using 4.2.2 latest patch...

      I have looked at all the files dated today and removed anything strange.. the two I found appear to be the only ones although I have asked the host's to check further...

      Odd thing is someone also tried to log into my Gmail account using my password no idea how they got that... that was blocked by Google... again password changed twice by logging in without using the warning emails just in case


      I think this email may have been related to one if my accounts

      Worrying to say the least
      Last edited by stuarttunstall; Wed 14 Sep '16, 2:23pm.

      Comment

      • Royalridge
        Member
        • Oct 2004
        • 31
        • 3.8.11

        #4
        I've had very similar yesterday with vB 3.8. The sequence of events was:

        Password re-set requested for an administrator account.
        Several attempts at sending reset token via HTTP get.
        Looks like one of these was successful.
        User logged in to vB Admin control panel.
        Then from the vB Admin control panel they uploaded three "products" which were then subsequently "deleted"
        A vBulletin "style" was also uploaded, accessed then deleted.
        Options in the admincp were looked at and possibly changed (still investigating this).
        In the payments API the destination e-mail address for PayPal payments was changed.
        Uploaded files were usermain.php, xml.php (both in the forum folder) and phpinfo.php in the webroot and sqls.php in "client"

        phpinfo.php - A file uploader
        xml.php - A multi-use tool with various menu options.
        usermain.php - A vBulletin "backdoor" that will log in any user by their userid
        sqls.php - Single file SQL tool

        Comment

        • Mark.B
          vBulletin Support
          • Feb 2004
          • 24275
          • 6.0.X

          #5
          Make sure that you are running the latest version of vB4 (4.2.3 at the moment).
          Make sure php is at least 5.5.

          Then go through the following:

          1) Run Suspect File Diagnostics under Maintenance -> Diagnostics. Replace any files not containing the expected contents. Delete any files that are not part of vBulletin and that you can't identify as belonging to your addons.

          2) Search all templates for iframe tags. They should only appear in the following templates: bbcode_video, editor-ie.css, member.css, stylegenerator.css, vbcms.css, vbulletin.css, help_bbcodes, humanverify_recaptcha, search_common, and search_common_select_type

          3) Check all your plugins for rogue include, require, include_once, or require_once code. All files should come from your server and be known to you.

          4) Check your plugins for any base64 code. I recommend using against using any plugins or products that include base64 code in them. However some "lite" or branded addons will include this as a means to prevent you from cheating the author. You'll have to make a personal call on these if you use them. This is often a sign of a hacked site.

          5) Make sure that your plugins do not include calls to exec(), system(), or pass_thru() or iframes. These are also often signs of a hacked site.

          Query for step 4 and 5 -
          SELECT title, phpcode, hookname, product FROM plugin WHERE phpcode LIKE '%base64%' OR phpcode LIKE '%exec%' OR phpcode LIKE '%system%' OR phpcode like '%pass_thru%' OR phpcode like '%iframe%';

          6) Run this query:
          SELECT styleid, title, template FROM template WHERE template LIKE '%base64%' OR template LIKE '%exec%' OR template LIKE '%system%' OR template like '%pass_thru%' OR template like '%iframe%';

          7) Check your list of admins. If there are any you do not recognise, dete them (don't ban them, delete them).

          If you're still unsure, and if you have support, please raise a support ticket and we'll take a look. We will need admincp access and ftp access.
          MARK.B
          vBulletin Support
          ------------
          My Unofficial vBulletin 6.0.0 Demo: https://www.talknewsuk.com
          My Unofficial vBulletin Cloud Demo: https://www.adminammo.com

          Comment

          widgetinstance 262 (Related Topics) skipped due to lack of content & hide_module_if_empty option.
          Working...
          😀
          😂
          🥰
          😘
          🤢
          😎
          😞
          😡
          👍
          👎