Support

Admin Tools

#11893 Hackers down multiple swites

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
n/a
PHP version
n/a
Admin Tools version
n/a

Latest post by nicholas on Friday, 06 April 2012 14:08 CDT

mneese
Mandatory information about my setup:

Have I read the related troubleshooter articles above before posting (which pages?)? yes
Have I searched the tickets before posting? yes
Have I read the documentation before posting (which pages?)? yes
Joomla! version: 1.5.26
PHP version: 5.1
MySQL version: 5.3
Host: rochen
Admin Tools version: 2.2.4
Description of my issue:
I had two accounts hacked on 4/4 on my rochen server Marbella...there are numerous other reported hacks (rochen forum), down sites on that server as well as repeated brute force attacks, and like myself, some have admin tools installed. These hackers go by the name SVU, and even have a boastful facebook page.
In response to tickets this is the "cut and paste" rochen response:
That's normal when an attacker scans blocks/ranges of IPs for vulnerable scripts. That indicates your account has been compromised due to vulnerable scripts under your account, incorrect permissions, or passwords stolen by malware from your local computer(s). I'd recommend that you follow these steps to clean and secure your account:

https://my.rochen.com/index.php?fuse...e&articleId=24

As long as you follow those guidelines on your accounts they won't be compromised, thank you.

I have applied the IP of the offenders to my "tools blacklist" and have not had issue with them since.
Although, others have been recently hacked. Is there a way to blanket my account using the admin tools blacklist, or to apply a htaccess directive to all accounts (even non-joomla), or better yet...can't Rochan or any server administrator apply a firewall block for the offending IP to stop their continued access?
Thanks for whatever you wish to address...

nicholas
Akeeba Staff
Manager
Since I do not know the exact way your site got compromised, I can not give you any advice. It all depends on the way the site got compromised, e.g. through Joomla!, through a directly accessible PHP file belonging to a Joomla! extension, a directly accessible PHP file in another folder, a non-Joomla! script (e.g. an outdated WordPress installation under your Joomla! root, or in a subdirectory/subdomain of your account), through a compromised site in the same VPS and so on.

If you enable all protection measures in Admin Tools, including the .htaccess Maker, than all of these attacks are averted except for two: a. a vulnerable third party script which you have specifically allowed to be accessible in .htaccess Maker's exceptions and b. another compromised site on the same account or VPS which has write access to your files.

That's why I can't give you any advice (which would make any sense). You only tell me who hacked you, not how.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!