I have exactly the same issue as in these tickets:
- #15116 – Warning malicious files found under your account on server
#24432 – logs/admintools_breaches.log
(I use Admin Tools Pro on Essentials subscription)
I know you've seen this before, and I know this is a problem with the hosting company, but please read on.
In my case, when there are files discovered that trigger their scan, the provider blocks outbound ports, such as 80, 443, 25, 587, etc. In some sites that don't depend on outbound access, this is a good way to prevent a botnet-style infection from spreading... but for Joomla, it needs outbound access all the time, else you cannot do updates, send notifications, etc.
Here's the response I got from the hosting company:
As per the analysis of the file "[path-deleted]/log/admintools_breaches.log", we observe that the file is just logging the attempt to the files to help identify any potential ongoing intrusions.
Yes, you are correct as per virus scan analysis it seems that only one particular file was caught for infection. Details have been provided below for you kind perusal.
#######################################
[path-deleted]/log/admintools_breaches.log: SiteLock-HTML-SEOSPAM-kfe.UNOFFICIAL FOUND
----------- SCAN SUMMARY -----------
Infected files: 1
Time: 128.719 sec (2 m 8 s)
#######################################
I have downloaded the file and do find that this particular file just logs the attempt to the file above to help identify any potential ongoing intrusions. For now I have removed the immutable attribute assigned to this file and have changed the file permission back to 644. Please note that port blocks for port 80,443 have been removed.
We had escalated the reported issue to our System Administration team and the ClamAV support team. We have analyzed the issue and will be unable to whitelist the ClamAV signature generated while scanning the file "[path-deleted]/log/admintools_breaches.log".
Please note that the signature generated while scanning the file [path-deleted]/log/admintools_breaches.log is a know malware infection. However, our server admin team have excluded the given file from the next ClamAV scan.
If you receive mails about malware infection about the same file, kindly update us and we will get the same checked from our end.
I'd imagine this must affect a lot of Admin Tools users, since this seems to be a common way that hosts set up cPanel to do scans. I understand their side: they have all kinds of different sites, not just Joomla, and they cannot tell (automatically) whether a certain folder (which is in the webspace) MIGHT be executable somehow. I also understand your side: it's not your fault that some hosts have aggressive and poorly-configured scanners that cannot whitelist.
But this seems like it might be widespread, if it's part of cPanel.
So perhaps a potential solution...
How about an option or setting in Admin Tools, that if enabled, would cause it to write these logs slightly differently, so that instead of recording the full malware signature, it could use one of the following measures:
- Partial malware signatures (not enough to trigger a scanner), or
- No signature, but rather a REFERENCE to the malware, such as a CVE id (though this one could be tricky unless Admin Tools already has the id). or,
- A hash made of "[signature]+[some fixed string]. This would keep it easy to identify within Admin Tools, but no scanner would be able to tell what the source of the hash was.
I know this isn't your problem to fix. But an option in Admin Tools could be the solution, making life easier for your users.
Many thanks for your time and your exceptional software. I will continue to support your efforts by renewing my subscription, as I have done for the past 5 years.
Kind regards
Geoff.