Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...User reports malware, and this looks odd...User reports malware, and this looks odd...
Previous
 
Next
New Post
8/9/2016 6:06 PM
 

Greetings!  www.frankcohengroup.com is built with DNN 7.4.2.  A user sent me an image today that access to the site was blocked by Kaseya AV as infected with Trojan.Script.Iframer.  Another user last week mentioned a scary popup that announced they had a virus and should call right away for removal.

There is some odd code at the bottom of /default.aspx, a JavaScript function sbhq() that contains a large encoded string and a second function hbfz that loads a window and calls sbhq.  I removed the function from /default.aspx but it still appears on the site (but did not reappear in the file).  The rendered page also contains a div with an iframe leading to gofitnes.top/sd/?wtdmRB (the div was never in the ASPX file)- so pretty sure there is an issue.  

Virus scanner on the server doesn't see anything, nor did two web-based site scanners.

Is this malware?  Any ideas how to remove?  I searched all files in every folder of DNN and the function and div are not present.  Is it in the database?  IIS process?

Best,
Scott

 
New Post
8/11/2016 10:01 AM
 
Scott,
most likely, your site has been hacked, check Host > Superuser accounts for unknown recently created accounts.
Besides, you need to find out, how the text has been inserted.
I suggest downloading latest version of DNN Security Analyzer module from https://github.com/DNNCommunity/Secur...
install and run it, it should guide you through the steps.

Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
8/11/2016 1:00 PM
 

Sebastian,

Sad, but true!  I removed the Install pages on 3 July 2016, but it was too late - the hack occurred on 30 June 2016

Using an Atlanta,GA IP address, hacker ran an install of "7.4.2.1" which replaced \default.aspx, added aspx pages to portals\_default\Smileys and created new host account and made the following host setting changes:

Search_Author_Boost 15
Search_Content_Boost 35
Search_Description_Boost 20
Search_Tag_Boost 40
Search_AllowLeadingWildcard N
Search_Title_Boost 50
AdminMembershipResetLinkValidity 1440
SSLDomain
UpgradeForceSSL N
SMTPMaxIdleTime 0
SMTPConnectionLimit 1
WebRequestTimeout 10000
ProxyPort -1
DemoPeriod -1

These setting seem ok / benign to me - should I change any of them?

I believe I have remedied the other hacks - for sure that mysterious JavaScript is now gone and the user that reported the issue no longer gets a warning from his AV.

I can't say enough good things about the support here and the Security Analyzer.  Awesome.  That should pinned be on the Host's favorites by default.

Thanks,
Scott

 
New Post
8/12/2016 7:04 AM
 
Scott,
ouch.
The default settings mentioned above should be fine, some might be edited via Host > Host Settings, if you have different requirements.

Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
8/30/2016 3:56 PM
 
I have the "data:text/html" showing up on a few installs I hve live, not sure how to find out where the JS injection is getting into the default page. Did an upgrade to the latest version and the problem did not go away. Any help would be greatly appreciated. http://www.novadoorsandwindows.com/ - open up the page source- script at the bottom.
 
Previous
 
Next
HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...User reports malware, and this looks odd...User reports malware, and this looks odd...


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out