Page 1 of 1

Iframe injected javascript

Posted: Thu Jan 08, 2015 3:59 pm
by Khue
My Joomla! website has been infected by an iframe injected malware, according to Sucuri SiteCheck:


I realized that I missed the latest security updates from Joomla! :(

I deleted the infected file, i.e., .../media/system/js/caption.js, and took the site offline. Now what I am planning to do are:

1. On localhost: upgrade Joomla! as well as all the installed extensions to the latest versions. (Should I upgrade to 3.x or stay at 2.5?)
2. Move the website to a new hosting.

Does it suffice? Since I deleted the infected javascript file, I do not know what the injected code look like, thus will not be able to find other infected files.

Thank you very much for any suggestions!

Re: Iframe injected javascript

Posted: Thu Jan 08, 2015 4:29 pm
by leolam
The only proper thing you can do is follow all these steps which were posted by Mandville and leave no step out!

[ ] Download and RUN the Forum Post Assistant / FPA Instructions available here and are also included in the download package. Post the generated results in your security/been hacked topic. Use these links to download the FPA:
Download .tar.gz version or Download the .zip version NOTE: Do not download the FPA from any other website or links found on the Internet.

[ ] Ensure you have the latest version of Joomla for your version of Joomla. Delete all files in your Joomla installation, saving a copy of the configuration.php file.

[ ] Review Vulnerable Extensions List to make sure any 3rd party extensions versions used appear on the vulnerable list.

[ ] Review and action Security Checklist 7 Make sure you've gone through all of the steps.

[ ] Scan all machines with FTP, Joomla super admin, and Joomla admin access for malware, virus, trojans, spyware, etc. Checklist 7 contains a list or recommended scanners.

[ ] Change all passwords and if possible user names for the website host control panel. Change the Joomla database user name and password.

[ ] Use proper permissions on files and directories. They should never be 777, ideal is 644 for files and 755 for directories. The configuration file can be set to 444 which is read only.

[ ] Check your htaccess for for any odd code (i.e. code which is not in the standard htaccess supplied as part of the Joomla installation).

[ ] Check the crontab or Task Scheduler for unexpected jobs/tasks.

[ ] Ensure you do not have anonymous ftp enabled.

[ ] Verify individually that any non-Joomla file such as but not limited to that will be placed back on the website such as images, pdf files, files for download, and other documents and files are valid and are supposed to be part of your website.

[ ] Replace the deleted files with fresh copies of a current full version of Joomla (minus the installation directory) you downloaded earlier. Install freshly downloaded copies of any extensions and templates used on the site. If the Joomla database user name and password were changed earlier, then make the necessary changes to the configuration.php file and upload a copy to the website. Upload any non-Joomla files that are necessary for your website. Only by replacing all files in the installation (including extensions and templates) can you be sure to remove the backdoors inserted and hidden in various files and directories More detailed information can be found in the Security Checklist 7 document.

Leo 8)

Re: Iframe injected javascript

Posted: Thu Jan 08, 2015 5:45 pm
by Khue
Hi Leo. Thanks for the answer.
leolam wrote: [ ] ... Delete all files in your Joomla installation, saving a copy of the configuration.php file.
Could you please be more specific? Do you mean deleting all files in the installation folder?