Fake accounts + Viewer.aff & wap2.aff

Discussion regarding Joomla! 1.5 security issues.
Joomla! Vulnerable Extensions: http://feeds.joomla.org/JoomlaSecurityV ... Extensions

Moderator: General Support Moderators

Forum rules
Forum Rules
Absolute Beginner's Guide to Joomla! <-- please read before posting, this means YOU.
Security Checklist
Forum Post Assistant - If you are serious about wanting help, you will use this tool to help you post.
Locked
rustyDusty
Joomla! Enthusiast
Joomla! Enthusiast
Posts: 134
Joined: Mon Feb 25, 2008 3:17 pm

Fake accounts + Viewer.aff & wap2.aff

Post by rustyDusty » Wed Jan 14, 2015 12:19 pm

for the 5th time I just had my account suspended by webhost with the following message:
It has come to our attention that your hosting account appears to be hacked again .
We have run a scan on your account and have found the following files that have been affected:
###
FILE HIT LIST:
{HEX}php.ircbot.InsideTeam.471 : /home/myaccount/public_html/site/cache/viewer.aff
{HEX}perl.ircbot.UberCracker.158 : /home/myaccount/public_html/site/cache/wap2.aff
###
We have temporary suspended your account .
I logged onto my site and a few fake accounts are there. I would like to know how to secure the cache folder. It is already set to 755.

rustyDusty
Joomla! Enthusiast
Joomla! Enthusiast
Posts: 134
Joined: Mon Feb 25, 2008 3:17 pm

Re: Fake accounts + Viewer.aff & wap2.aff

Post by rustyDusty » Wed Jan 14, 2015 12:53 pm

Also how are they doing this? What is the back door. Will changing the admin account passwords make a difference?

The cache folder that was hacked is not the admin cache.

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 15152
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Fake accounts + Viewer.aff & wap2.aff

Post by mandville » Thu Jan 15, 2015 11:47 am

fake account are usually resolved by using a blacklist / honeypot plugin.

[ ] Download and RUN the Forum Post Assistant / FPA Instructions available here and are also included in the download package. Post the generated results in your security/been hacked topic. Use these links to download the FPA:
Download .tar.gz version or Download the .zip version NOTE: Do not download the FPA from any other website or links found on the Internet.

[ ] Ensure you have the latest version of Joomla for your version of Joomla. Delete all files in your Joomla installation, saving a copy of the configuration.php file.

[ ] Review Vulnerable Extensions List to make sure any 3rd party extensions versions used appear on the vulnerable list.

[ ] Review and action Security Checklist 7 Make sure you've gone through all of the steps.

[ ] Scan all machines with FTP, Joomla super admin, and Joomla admin access for malware, virus, trojans, spyware, etc. Checklist 7 contains a list or recommended scanners.

[ ] Change all passwords and if possible user names for the website host control panel. Change the Joomla database user name and password.

[ ] Use proper permissions on files and directories. They should never be 777, ideal is 644 for files and 755 for directories. The configuration file can be set to 444 which is read only.

[ ] Check your htaccess for for any odd code (i.e. code which is not in the standard htaccess supplied as part of the Joomla installation).

[ ] Check the crontab or Task Scheduler for unexpected jobs/tasks.

[ ] Ensure you do not have anonymous ftp enabled.

[ ] Verify individually that any non-Joomla file such as but not limited to that will be placed back on the website such as images, pdf files, files for download, and other documents and files are valid and are supposed to be part of your website.

[ ] Replace the deleted files with fresh copies of a current full version of Joomla (minus the installation directory) you downloaded earlier. Install freshly downloaded copies of any extensions and templates used on the site. If the Joomla database user name and password were changed earlier, then make the necessary changes to the configuration.php file and upload a copy to the website. Upload any non-Joomla files that are necessary for your website. Only by replacing all files in the installation (including extensions and templates) can you be sure to remove the backdoors inserted and hidden in various files and directories More detailed information can be found in the Security Checklist 7 document.
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be reported, added to the foe list and possibly just deleted
{VEL Team Leader}{TM Auditor }{ Showcase & Security forums Moderator}

RadioClick
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Sat Apr 11, 2015 3:32 pm

Re: Fake accounts + Viewer.aff & wap2.aff

Post by RadioClick » Sat Apr 11, 2015 3:37 pm

I have also this problem thank you for share this problem


Locked

Return to “Security in Joomla! 1.5”