Hacked by Chamuju Featuring RyGhost

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • edgespeeder06
    Member
    • Oct 2009
    • 70

    [Forum] Hacked by Chamuju Featuring RyGhost

    I just had my forum and several other sites on the same sever hacked...what are my options to stopping further hacking? 1st time so I'm not sure what to do exactly. I know I have to delete the install directory, thought I had done it a month ago though.

  • beishe8
    Senior Member
    • Oct 2005
    • 6782
    • 4.2.X

    #2
    Originally posted by edgespeeder06
    I just had my forum and several other sites on the same sever hacked...what are my options to stopping further hacking?
    Change server or change host.


    vB5 is unequivocally the best forum software, but not yet...

    Comment

    • edgespeeder06
      Member
      • Oct 2009
      • 70

      #3
      Originally posted by beishe8

      Change server or change host.
      Really? I cant find anything on this hacker nor can I find what he changed yet.

      Comment

      • LBS
        Member
        • Mar 2007
        • 46
        • 5.5.x

        #4
        Try:
        -Make sure that you are the only administrator.
        -Change the administrator pass
        -Add maximum security permissions to your vbulletin filesystem directory.
        -Change the FTP login pass.
        -Don't use FTP but more secure protocols.
        -Change you webhost passwordss.

        Comment

        • LBS
          Member
          • Mar 2007
          • 46
          • 5.5.x

          #5
          Also try to find the cause:
          1) Check the webserver logs and search for all IP-addresses that access the admincp directory. Record all unknown IP adresses.
          2) Check the webserver logs and search the recorded IPs. Analyze all their behavior before up till the point that they use the admincp directory.

          Comment

          • edgespeeder06
            Member
            • Oct 2009
            • 70

            #6
            I have my server company looking at it.....they even took down wordpress sites. I don't know where to begin since I can't find anything in the logs other that all the sites had adjustments made today

            Comment

            • beishe8
              Senior Member
              • Oct 2005
              • 6782
              • 4.2.X

              #7
              Originally posted by edgespeeder06

              Really? I cant find anything on this hacker nor can I find what he changed yet.
              Perhaps because the attack came from somewhere else:
              "several other sites on the same sever hacked"

              Seems the server is not protected.




              vB5 is unequivocally the best forum software, but not yet...

              Comment

              • Wayne Luke
                vBulletin Technical Support Lead
                • Aug 2000
                • 74123

                #8
                There are four steps to securing your site. If you don't do them all or you do them in the wrong order than you're still susceptible to being attacked again.

                Close the hole... This has three subparts in this instance.
                1. Delete your install folder
                2. Review your admin users and delete any that don't belong. Don't ban them. Don't make them regular users. Delete them.
                3. Close access to your AdminCP using .htaccess. Use either user authorization with a different username and password or IP address restrictions.
                Fill the Hole... There are seven subparts in this instance.
                1. Review your files for changes. You can do this under Maintenance -> Diagnostics.
                2. Delete any Suspect Files.
                3. Replace any files marked as "Does not contain expected contents"
                4. Scan your plugins for malicious code (exec, base64, system, pass_thru, iframe are all suspect keywords). Delete any you find.
                5. Repair any templates. Any templates that you don't have notes on changing, you need to revert. If you're using a custom style, it is best to delete your existing style and reimport from a fresh download.
                6. Update your Addon Products.
                7. Rebuild your datastores. You can use tools.php in the "do not upload" folder to do this. Upload it to your admincp directory, delete when done.
                Secure the Hole
                Parts of this were done by closing the hole but there are still things to do here.
                1. Keep notes of all changes you make to the system - what templates and phrases you change, what files belong to which addons, what plugins do the addons install.
                2. Consider using a separate Super Admin who has access to admin logs in the AdminCP. There should be only one Super Admin.
                3. Create a lower permission Administrator for every day use.
                4. Review your permissions in the system.
                5. Block off access to the includes, modcp, packages and vb folders via .htaccess. Deny All can work here, unless you use the ModCP. You need user authorization there.
                6. Move your attachments outside the forum root directory.
                7. Create a complete backup of your site. Make database backups weekly.
                Vigilance
                You need to keep active on the security of the site.
                1. Give out the fewest permissions necessary for anyone to do their job
                2. Make sure your hosting provider updates the software.
                3. Update to the latest vBulletin when it is released.
                4. Make sure your addons are always up to date.

                Translations provided by Google.

                Wayne Luke
                The Rabid Badger - a vBulletin Cloud demonstration site.
                vBulletin 5 API

                Comment

                • edgespeeder06
                  Member
                  • Oct 2009
                  • 70

                  #9
                  Originally posted by Wayne Luke
                  There are four steps to securing your site. If you don't do them all or you do them in the wrong order than you're still susceptible to being attacked again.

                  Close the hole... This has three subparts in this instance.
                  1. Delete your install folder
                  2. Review your admin users and delete any that don't belong. Don't ban them. Don't make them regular users. Delete them.
                  3. Close access to your AdminCP using .htaccess. Use either user authorization with a different username and password or IP address restrictions.
                  Fill the Hole... There are seven subparts in this instance.
                  1. Review your files for changes. You can do this under Maintenance -> Diagnostics.
                  2. Delete any Suspect Files.
                  3. Replace any files marked as "Does not contain expected contents"
                  4. Scan your plugins for malicious code (exec, base64, system, pass_thru, iframe are all suspect keywords). Delete any you find.
                  5. Repair any templates. Any templates that you don't have notes on changing, you need to revert. If you're using a custom style, it is best to delete your existing style and reimport from a fresh download.
                  6. Update your Addon Products.
                  7. Rebuild your datastores. You can use tools.php in the "do not upload" folder to do this. Upload it to your admincp directory, delete when done.
                  Secure the Hole
                  Parts of this were done by closing the hole but there are still things to do here.
                  1. Keep notes of all changes you make to the system - what templates and phrases you change, what files belong to which addons, what plugins do the addons install.
                  2. Consider using a separate Super Admin who has access to admin logs in the AdminCP. There should be only one Super Admin.
                  3. Create a lower permission Administrator for every day use.
                  4. Review your permissions in the system.
                  5. Block off access to the includes, modcp, packages and vb folders via .htaccess. Deny All can work here, unless you use the ModCP. You need user authorization there.
                  6. Move your attachments outside the forum root directory.
                  7. Create a complete backup of your site. Make database backups weekly.
                  Vigilance
                  You need to keep active on the security of the site.
                  1. Give out the fewest permissions necessary for anyone to do their job
                  2. Make sure your hosting provider updates the software.
                  3. Update to the latest vBulletin when it is released.
                  4. Make sure your addons are always up to date.

                  Thanks that really helps! Whats the correct path to delete as part of the install files? Just the /install/ folder?
                  Last edited by edgespeeder06; Tue 8 Oct '13, 2:28pm.

                  Comment

                  • beishe8
                    Senior Member
                    • Oct 2005
                    • 6782
                    • 4.2.X

                    #10
                    Originally posted by edgespeeder06
                    Just the /install/ folder?
                    Yes.



                    vB5 is unequivocally the best forum software, but not yet...

                    Comment

                    widgetinstance 262 (Related Topics) skipped due to lack of content & hide_module_if_empty option.
                    Working...