I just read today on another list how someone uses porn sites to test
their security systems ...
that just has to qualify as the best excuse ever.
Joking aside, I moderate on a totally computer unrelated group and it is
so sad the amount of spam that gets pushed, moderating is a thankless task
more often than not.
I think if anyone on the group does not understand or appreciate what you
are doing to protect them, they should raise their hands and offer you
assistance.
Thanks for your hard work.
Duncan
Happy to help at anytime.
--
Duncan Hill
(DHadmin)
Forums are one of the sites that we are seeing an increase in attacks.
If an open forum allows content to be published that provides a link /
or delivery vehicle for malware distribution, it can lead your whole
domain being listed at Google and effectively de-listed from the Google
Index.
Two main reasons for hiding the target of the links in the spam:
1. Regular users might actually click on them.
2. If they can push enough posts on enough forums, makes you wonder what
it would do for their PR of those target sites (for those that they
cared about).
On some of the sites I manage, (2) isn't the prevalent option since most
of the sites referenced in the spam are using Fast Flux type methods and
therefore must only be interested in visitors.
But I have seen the odd genuine site. (Geniune only in the fact that
it's a permanent site, spamvertised maybe, but they are either SEO
naieve or stupid or more likely both).
My old personal blog purely exists now so that I can (1) contribute to
project honeypot, and (2) maintain my own personal list of IP's to block
from my other sites. I "hid" the comment controls from real users, but
still the spammers keep on coming, and I keep on adding them to the
blocklist... (note for Webado - hid from real users in a way not to
been seen by Google to be hiding things ;) but I should save that part
for the SEO group)
I've been a member of spamcop for years and spammers rank 1 rung up the
ladder from amoeba in my book, except the amoeba still have the higher IQ...
Chris
You only need to do a scan/review of your site, once you have been
reported as having malware on your site.
i.e.
you get listed at SBA or Google
you then clean your site
ensure your site is clean
close the door to the attackers
then request a review at SBA (and maybe via your Google Webmasters
Toolpanel).
That's what the review/scan process is for.
If you request a review of your site BEFORE it is cleaned, and it still
has malware on it when they re-scan it, it adds a bucket load of time
until you get removed from the list.
There is a separate link for checking if your site is listed in the
database (or clearinghouse as they call it)
http://stopbadware.org/home/reportsearch
McAfee SA also takes input from users, much like the spamcop reporting
system, whereby after a (hidden-) predefined number of user 'bad
reports', it will trigger the site to be listed (I suspect that human
verification is performed before a red-flag is raised rather than it
being totally automatic unlike the spamcop system).
StopBadWare is "not-for-profit" site that merely deals with the
inspection of malware infection sites.
It also performs analysis of the malware that is out there.
Ipower got on the ball fairly quickly and #1 closed the door, #2 cleaned
up most of the sites without the users even being aware of it, #3
tightened up security scripts pretty damn good.
On the shared hosting accounts I manage now, they are packed with
attempts at hacking the accounts again.
> It got cleaned up aparently fully and the software updated, but we
> don't know how it happened in the first place and there's always the
> lingering fear of a server exploit not just an application
> vulnerability.
>
More than like it was an RFI (Remote File Inclusion) attack, and just as
likely part of the MPACK attacks.
> Not my server luckily, but a blog on a very highly ranked site.
One of the very first things I do on an install of a blog/forum or
similar type of OS is to do a mass search and replace for
name version x-xx (i.e. phpBB 1.2.3.4 or MT 1.2 or WordPress 4.3.2.1)
and replace it with something else.
If a vulnerability gets released for phpBB 4.3.2.1, all the malware guys
need to do is use Google to search for "phpBB 4.3.2.1" and they have a
nice handy list of sites to attack first.
Even if you just remove the version numbers from any software you
install on your sites, you cut your risks down.
Quite recently a very large bank in India itself became hacked using
MPACK and infected every page of the site with a hidden script that
tried to attack multiple vulnerabilities in the visitors browser (not
just Internet Explorer either).
Using Firefox because it's safer is no longer true these days. Using
Firefox with the NoScript addon is almost essential.
And you can't rely on using Firefox to view your site to see if its been
hacked, because some of the malware check for IP's / Browser versions to
see who is looking (to hide from Google et al).
No one is safe these days...