1. Please take a little time for this simple survey! Thank you for participating!
    Dismiss Notice
  2. Dear Pleskians, please read this carefully! New attachments and other rules Thank you!
    Dismiss Notice
  3. Dear Pleskians, I really hope that you will share your opinion in this Special topic for chatter about Plesk in the Clouds. Thank you!
    Dismiss Notice

hacked : document.write(unescape

Discussion in 'Plesk for Windows - 8.x and Older' started by wwalker@, Nov 10, 2007.

  1. wwalker@

    wwalker@ Guest

    All of the domains on my server have this script embedded into one of the main html template files:


    any ideas how it got there?

    It loads a hidden iframe with this url as the source: http://mn96.dns.gendistr.info/qualitytest

  2. jahsh420

    jahsh420 Guest

    Did you ever figure this out? We are having the same issue.
  3. lvalics

    lvalics Silver Pleskian Plesk Guru

    Jun 20, 2003
    Likes Received:
    Seems a server hack. Did you tried to install mod_security?
    Anyway, one of the application is vulnerable and need to find whoch one, also probbably they installed s99shell or r57shell script, so try to find it and delete all those files.
    Try to look on Google what kind of trojan is and try to kill it.
    Happy hunting :-(
  4. schatzy

    schatzy Guest

    same issue here, ASP server pages

    Recently, 20 to 30 files on our site have been hit by this exploit. We use Active Server Pages on IIS (Windows 2003 server).

    Does anybody know how this exploit is making its way in? Timestamps on files aren't changing so it's via HTTP.

    Is this an ad-clicking operation, spyware, or phishing site?

    Any ideas, anyone?
  5. bandurao

    bandurao Guest


    How does this hacking takes place:

    This hacking does not takes place by any PHP application vulnerability nor any kernel bug nor apache bug nor cpanel or Plesk bug. Those accounts files are affected whose FTP logins are leaked.

    Beleive me, I am reasearching behind this iframe and java script hack from last 10 months.


    How it's done
    This is a sophisticated operation, and the infection cycle is involved, but basically, the hacker(s) are setting up innocent looking sites (or using previously hacked sites where the owner is usually unaware of being compromised) and loading them with expensive hacking tools like Mpack. When someone visits that site, their browser is detected and attacked (browsers affected are IE, firefox and opera). The visitor is unaware that they may have a keylogger that sends the persons passwords ect to the hacker(s) and moves on. If the innocent visitor has an ftp or root password for any internet sites, the hackers use a program that goes to the persons site(s) and instantly adds the hidden iframe to every index type page. This is why there seems to be no indication that the site has been compromised, as the hackers already have the ftp or root passwords to login. And since they have at least your account ftp pass, whatever permissions your folders and files are set to make no difference.

    After they put the iframe code into that person's pages, anyone visiting that site will be redirected to the hackers infection site, where the person's computer will be injected and infected. The hackers are depending on site owners not knowing their sites have been hacked so that the number of hacked sites will grow (as they have starting in Italy) into the tens of thousands... Please don't think you can depend solely on your antivirus software to protect your computer. It more than likely won't help you. For $1000 dollars, the russian hacking bulletin boards are offering Mpack with 1 year support and a GUARANTEE that virus programs will not catch the keyloggers. SO, keep your virus program updated, but don't depend on it completely!

    This way this hack is spreading fastly from one computer to another broadcasting the passwords to hackers.During my research in this, I even found some of the password files collected by the hack on some of the hacked server, where they pass this password file to thier tool to add the code. In some cases Google bots picks this files and you can even find the login details of FTP accounts and Server root login details in google.


    For Server Administrators:

    If you are having this problem server wide then the only possibility is your root password is used for this. Just change the password and this HACK WILL STOP

    For individual person owning just a domain and not server:

    If you are facing this problem and your administrator says its only your account, just change the FTP password and it will stop

    You must have removed the code many times and it comes again, why ???
    As you dont change the FTP password. So change that first.

    Just changing password is not complete solution but is the first step.
    Whats next, your password is leaked that means your computer is sending out the passwords, so I would suggest you to do a clean format first and then install any antivirus of spyware which you think could block it. But the best solution is to clean format the computer.

    Just do the two things:

    1) Change the FTP or root password of server
    2) Clean format the PC

    and take care in future, you dont visit any lof the virsu links made by this hack.
    Also to keep your password secure I would suggest you to use any password manager software like:


    This is a FREE OpenSource Software

    I can assure you this is confirmed solution and will definitely help you all.
    Please try it and also when you are too confirmed, please spread this message in as many forums as you can so that others also come to know how to stop it.

    Comments can be sent from:
  6. raz3k

    raz3k Basic Pleskian

    Nov 12, 2006
    Likes Received:
    stolen ftp passwords


    If you are tired of this kinds of attacks you can use my solution and see what files were infected during that day.

    The "hackers" tend to make one file change at a time from different ip addresses/file, they usually inject 2 lines of code on the top of the file or bottom.

    The script searches through /usr/local/psa/var/log/xferlog for less than 20 occurrences from an ip address, and shows what files that ip modified.

    Not all files stated there will be infected, but you can make a daily ideea of what's going on on your vhosts and also fix those files using sed. Remember to change the ftp password also.

    Set up a crontab like the one below.

    59 3 * * * /your_path/ftp_log_sniff.sh

    P.S. I do not assume any responsibility for the program.

    Attached Files: