Support

Admin Tools

#17198 Admin Tools Compromised

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
n/a
PHP version
n/a
Admin Tools version
n/a

Latest post by nicholas on Friday, 23 August 2013 01:18 CDT

NuevaCommunications
Mandatory information about my setup:

Have I read the related troubleshooter articles above before posting (which pages?)? Yes
Have I searched the tickets before posting? Yes
Have I read the documentation before posting (which pages?)? Yes
Joomla! version: (different sites - 2.5.14 and 3.1.5.)
PHP version: (5.3.13.)
MySQL version: (5.1.66 )
Host: (DreamHost)
Admin Tools version: (unknown)

Description of my issue:

I have AdminTools Pro on all of my sites. My hosting service (DreamHost) has just reported that a bunch of my sites have been hacked. One of the files that was hacked on every site was:

administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php

Any thought or ideas about this? Below is the full report from DH.

Thanks for any help you can offer,

Matt

During a recent security scan we have identified that one or more of your hosted sites show signs of being compromised as they are hosting known, malicious web-based backdoors. Specifically, the following file(s) have been accessed by intruders and have been associated with unsolicited bulk email, denial of service or other abusive activity:

We have identified the following known backdoors under your account:
site1/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php
site1/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php
site2/includes/inbex.php
site2/includes/index.php
site2/plugins/content/rtl.php
site2/tmp/wsearch.php
site3/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php
site4/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php
site5/includes/index.php
site5/plugins/content/loadmodule/rtl.php
site6/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php
site7/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php
site8/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php
site9/administrator/components/com_admintools/akeeba/platform/jfscan/engines/archiver/jfscan.php


We have disabled the page(s) in question (via adjusting permissions on the files, e.g. chmod, or backing up the file first renaming it to "filename.INFECTED" and cleaning up the injected code) until you are able to address this matter.

The existence of these pages on your website(s) is likely a sign you have been compromised.

nicholas
Akeeba Staff
Manager
I thought I replied to that one just now? Basically it's a false positive. This file is used by our own PHP File Change Scanner and does contain the signatures of all malicious software that might get on your site. Other DeamHost clients had the same issue. We told them to tell DH to add that file to their whitelist. They said that they didn't know how. Do write them an email and tell them they are incompetent losers because that's what they are. It's a false positive. How hard can it be to put it in a whitelist, especially when their default and ONLY action is to screw that file up?!

Nicholas K. Dionysopoulos

Lead Developer and Director

πŸ‡¬πŸ‡·Greek: native πŸ‡¬πŸ‡§English: excellent πŸ‡«πŸ‡·French: basic β€’ πŸ• My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

NuevaCommunications
Ok, thanks. I made the whitelist request and deleted all of the non-admintools files cited. Should I set the admintools file permissions back to 644?

I'm nervous, though, as I don't know how those other files (and they were truly hacks, I checked) got inserted. We have recently changed sftp passwords, have used the Fix Permissions tool, have admintools pro fully functioning, and always keep joomla and all components up to date. Is there anything else I could be doing to prevent this from recurring?

Thanks,

Matt

nicholas
Akeeba Staff
Manager
The other files do not seem to be part of the Joomla! installation or legitimate extension files. Without knowing their contents I do not know what they are.

As for the steps you can follow to secure your site, read this: https://www.akeebabackup.com/documentation/walkthroughs/unhacking-your-site.html#idp142305616

Nicholas K. Dionysopoulos

Lead Developer and Director

πŸ‡¬πŸ‡·Greek: native πŸ‡¬πŸ‡§English: excellent πŸ‡«πŸ‡·French: basic β€’ πŸ• My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!