• Resolved inndesign

    (@inndesign)


    Despite closed relays on the server, hardware firewall, and all the other precautions of a quality dedicated server, the one WordPress 4.0 website with NextGEN Gallery is being hacked for spamming, even under version 2.0.66.29, for the last three months.

    The current script was found at /home/account/public_html/wp-content/plugins/nextgen-gallery/products/inc.php it was being posted to send mail: [13/Oct/2014:08:24:14 -0500] “POST /wp-content/plugins/nextgen-gallery/products/inc.php HTTP/1.1” 200 65 “-” “Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.7.6)”

    30 IP’s were posted to it, using the website as a spam generating workstation. We have the top techs at Wiredtree.com monitoring the problem, but NextGEN continues to be breached without use of account passwords, despite all safeguards.

    The breach and activity is done in such a way as to evade malware scans and user and colocation center awareness. We found it only because our ability to send 30 emails was blocked due to server limits reached.

    Simply a warning for anyone researching, NextGEN Gallery is being effectively exploited by Chinese hackers for the purpose of spamming with multiple IPs, at the demise of your domain integrity, email load and IP assigned.

    https://www.ads-software.com/plugins/nextgen-gallery/

Viewing 6 replies - 16 through 21 (of 21 total)
  • I have the same issues. It comes back after cleaned hacked php files. Php backdoors are written in the nextgen-gallery folder, and i suspect at this point it’s an hole in this plugin.
    Still, i exclude the plugin package has been modified, since we are all probably downloading it from trusted sites.

    Difficult to prove this btw. But very probable.
    I’ll send you a pcap file where is visible the nextgen gallery php backdoor called by the hacker. Still wandering how those php files are written. I am considering this plugin not safe for now, sorry. Will find some other gallery for now.

    Plugin Contributor photocrati

    (@photocrati)

    @spectrum70 – This is an old topic and even though we have not seen any proof related to the details noted in this topic we have release several versions with security updates since it was started.

    If you are still experiencing problems please feel free to start your own topic or send us a Bug Report as appropriate.

    Thanks!

    – Cais.

    +1 Have some problem.
    I have 15 sites on 1 account on my hosting.
    And I have some problems with alien php files in different places on 3 sites of 15. On all 3 these sites installed a NGG by photocrati.
    It seems to be something wrong. Sorry guys, but if few peoples speak about problems – it is necessary to consider.
    I see no other solutions than to renounce the use of plug-in. Sorry

    Plugin Contributor photocrati

    (@photocrati)

    @smiler777 – Unfortunately we still have not received any proof or information related to this issue at hand … NextGEN Gallery is a very commonly found plugin but we are not aware of any security issue that would allow what is being described to happen.

    – Cais.

    Hello Web-Admins here,
    to extinct the bad scripts it′s not sufficent at all to delete the plugin, where you found (one of) the script.
    It′s known, that this kind of attacks spreading their code in the whole WordPress installation. Not only in seperate files, but as well in existing files of the core, themes and plugins and even in the database!
    The intrance for the spammers might be a plugin, a theme, the core, but as well a bad passworded WordPress or FTP account.
    So it makes absolutely no sense to accuse a specific plugin, if you have no evidence in the (original!) code of this plugin.
    First of all you should clean your complete installation. Use plugins like the above mentioned “Anti-Malware and Brute-Force Security by ELI” or / and others like “AntiVirus” by Sergej Müller, “Exploit Scanner” by Donncha O Caoimh, …
    Then protect your WordPress with plugins like “Limit Login Attempts” Johan Eenfeldt, “NinjaFirewall (WP edition)” by The Ninja Technologies Network (very much recommended!), “SF Author Url Control” by Grégory Viguier, “Snitch” by Sergej Müller, “SX User Name Security” by Daniel Roch, Julio Potier and SecuPress, …
    And – last but not least – change your all passwords (WordPress, FTP, …) and never use your WordPress admin account to write posts.

    Plugin Contributor photocrati

    (@photocrati)

    @bhenselmann – Thanks for sharing a lot of great tips and ideas!

    – Cais.

Viewing 6 replies - 16 through 21 (of 21 total)
  • The topic ‘NextGEN Gallery Hacked by Spammers’ is closed to new replies.