Support

Admin Tools

#24239 Zero Day Attacks

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
n/a
PHP version
n/a
Admin Tools version
n/a

Latest post by on Saturday, 20 February 2016 17:20 CST

Nick_Q
 HI Nicholas,
Happy new year to you...

Pretty much all of my sites (c. 53 off) run Joomla latest version which, for this last update was done within a few days of the furore around the Zero Day vulnerability in Mid December 2015. (Dates Vary)

All of my sites run both Akeeba backup and Admin Tools (OK so I am a big fan still and been using your Extensions as a matter of course for the last 5 years at least....

On checking the log files there are Definitely entries from the offending IP's but
IP addresses involved are as follows:

* 146.0.72.83
* 74.3.170.33
* 194.28.174.106

However, my understanding was that the MUA shield would guard against any malicious attacks and on the few sites that I have so far checked there are certainly trapped IP's marked down as blocked by the MAU shield (albeit they are not those highlighted above)

My question is this - how do I tell if any of these attacks got through? (my "helpful" tech support man at Heart internet tells me that if there is evidence of attempts in the logs then I need to assume the site is compromised!) There certainly is the evidence (see below) but not any other obvious effect.

Example log entries as follows:


* dazlious.org 202.69.240.70 - - [16/Jan/2016:12:32:56 +0000] "GET / HTTP/1.1" 200 20104 "-" "}__test|O:21:\"JDatabaseDriverMysqli\":3:{s:2:\"fc\...
* carolcumber.com 146.0.72.83 - - [14/Dec/2015:11:55:08 +0000] "GET / HTTP/1.1" 200 4788 "-" "}__test|O:21:\"JDatabaseDriverMysqli\....
* naturalharmonycentre.co.uk 194.28.174.106 - - [14/Dec/2015:21:03:27 +0000] "GET / HTTP/1.1" 200 16651 "http://google.com/" "}__test|O:21:\"JDatabaseDriverMysqli\"....

I am also being told that the only way to overcome an effected site is to restore from a backup prior to the attack and/or completely rebuild the site. Given the fact that I place these backups into my AWS S3 account with a 10 day lifecycle on the Receiving bin most of these are no longer there! (Now reset to 30 days!!)

Sorry to be so wordy by as ever, would really appreciate your clarity...

tampe125
Akeeba Staff
Hello Nick,

if you have the latest version of Joomla installed and you're using the latest version of Admin Tools, you can consider yourself safe.
To check if anything changed your site, you should run the PHP Scanner daily and review its results: if you didn't update any extension but you find that some files were changed... well you can assume something bad happened on your site.

Davide Tampellini

Developer and Support Staff

🇮🇹Italian: native 🇬🇧English: good • 🕐 My time zone is Europe / Rome (UTC +1)
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

System Task
system
This ticket has been automatically closed. All tickets which have been inactive for a long time are automatically closed. If you believe that this ticket was closed in error, please contact us.

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!