![]() |
Trojan removal HELP needed
I just got the information that some (maybe all) of my sites seem to be infected with a trojan:
http://www.heathersboobs.com/ http://www.teeny-facials.com/ http://www.pissdrinkingchicks.com/ http://www.backsideteens.com/ Generic Downloader.z trojan How can I remove it and any idea where it comes from? |
that particular exploit is uploaded through FTP. Your FTP account has been compromised.
Change your FTP password, remove the script at the bottom of the page that runs the iframe: [code=trojan stuff on your pages] [/code] You might have your host run a check to see what other files were modified at the same time. Pattern to look for is: Login, Get File, Put File, Get File, Put File, Logout usually no failed password attempts. Sources for your password leak: People that have installed software for you in the past, anyone that has had FTP access to your machine, possibly any keylogger on your system. When you give out passwords to people to install software or fix something on your site, set a temporary password, let them do the work, reset the password when they are done. Don't use the same password everywhere. Tommy keeps a black book of his passwords for each different site and sponsor login so that any one that is compromised won't be a security problem for other sites. |
Quote:
Could this trojan be responsible for dropping sales? My sales crashed at the beginning of May and I didnīt figure out why. |
its possible. There are a number of trojans out there that see sites and replace codes in urls so that they get credit. So, yes, that is within the realm of possibility.
Its also possible that surfers running any antivirus got the warning and backed out of the site. the last modified time on the first site is May 5th, so, its been there a while and I would consider that a very good possibility that it affected sales. you can check the dates |
Quote:
When itīs done webair will check it and I hope itīs clean again. |
Quote:
I would bet the source of the password leak is a sponsor |
Quote:
eg. ThatSponsor @ MyDomain.com |
Quote:
Iīm now using unique login / password combinations, changing the password regularly and my passwords are now complicated and much more difficult to guess. Not all my sites were infected. Not sure enough to accuse him publicly, though. Fortunately not even one gallery was modified with the script. The script forced the installation of an "start.exe" which connected to a site hosted at "inhoster.com". I donīt think itīs worth to contact them if you have a look at their site. The site called us-counter.com and dnv-counter.com belong to a guy from Ukraine and are blacklisted with several records. IPīs from the sites and from the hosting company are pretty much the same. Iīd like to close down that hoting company for sure. Those behaviour easily ruins the reputation of persons involved. |
All times are GMT -4. The time now is 04:29 PM. |
Powered by vBulletin® Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Đ Greenguy Marketing Inc