I was hit over the 4th of July weekend by a script that scans the entire database of users looking for those who have matching username and passwords. It goes through all users one by one until it finds an account that fits this description, then once it's able to log in, send several nasty PMs to multiple other users. These PM had links to sites that had viruses on them.
Anyway to make a long story short, a whole lot of PM's with similar titles were sent out in a very short time. Lacking a solution and feeling very bad that somehow my users accounts had been comprised (not knowing at the time it had hit those with matching username and password) and not wanted innocent users who had the PM sent to them to get a virus, I went in the database and directly deleted a range of PM's using something like
I didn't realize at the time the harm this could do and am now in desperate need to clean this up. Any help from vbulletin on both how to clean this up, and how to prevent it from happening again would be greatly appreciated.
Anyway to make a long story short, a whole lot of PM's with similar titles were sent out in a very short time. Lacking a solution and feeling very bad that somehow my users accounts had been comprised (not knowing at the time it had hit those with matching username and password) and not wanted innocent users who had the PM sent to them to get a virus, I went in the database and directly deleted a range of PM's using something like
Code:
DELETE * FROM pm WHERE pmtextid >430323 AND pmtextid <446690
I didn't realize at the time the harm this could do and am now in desperate need to clean this up. Any help from vbulletin on both how to clean this up, and how to prevent it from happening again would be greatly appreciated.
Comment