Support

Admin Tools

#28858 Malicious file detected by my hosting

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
n/a
PHP version
n/a
Admin Tools version
n/a

Latest post by nicholas on Monday, 11 December 2017 11:42 CST

vrans99
For the AdminTools version, I believe it should be the later version. It is either 4.2 or 4.3 most likely. I don't have access to the administrator side to verify that.

I got this email from my hosting company:

-------------------------------------------------------------------------------------------------
Dear Reseller,
As provider of Shared Hosting services, we monitor the usage of all our customers to ensure that our Quality of Service is not adversely affected. Our goal is to ensure that one customer should not affect all the other customers on the same server.
As part of our routine monitoring, we have observed that some of the files hosted on this server belonging to marionoakssda.org hosted under your account, has some malicious files hosted. In order to prevent blacklisting of our service with various service providers, we have blocked outbound port 80, 443, 587 and 465 for this domain name as a precautionary measure. Here are the details of the files that were detected to be malicious.
/ho.../log/admintools_breaches.log ERROR
We strongly suggest you to scan all the above listed files for any vulnerabilities. If the files are part of some plugins of your CMS, then we suggest you to update the plugin to the latest version or contact the plugin developer directly.
Steps to un-block port 80, 443, 587 and 465
• Login to cPanel
• In the find section, search for “Port 80”.
• Under “Health Checks and Monitoring” tab, click on Port 80 icon and follow instructions on the screen.
If you have any queries, please feel free to contact our Support team.
Regards, The Resellerclub Team
Disclaimer: This is an auto-generated email sent by our monitoring system. Please contact our Support HelpDesk for further information.
--------------------------------------------------------------------------------------------------

I don't have access to the administrator side of the website now.I get to enter my username and password for the AdminTools security popup but it will redirect me to the frontpage.
What should I do?

nicholas
Akeeba Staff
Manager
Your site IS NOT at risk. Quite the opposite.

This is a plain text, not executable, log file. It logs (keeps a record of) all attacks launched against your site and blocked by Admin Tools. In other words, it's a record of what Admin Tools has stopped. Of course it will contain "malicious" data by definition: it's the information attackers submitted to your site. However, since this is an inert, non-executable, plain text, log file your host has no reason for flagging it.

Please contact them and let them know that their detection software is broken.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

vrans99
I am glad to know that.
Should I delete the file? I have some services blocked because of that.
Also, why I can't access the administrator? AdminTools popup window comes up and I enter the username and password and it will redirect me to the frontpage.

nicholas
Akeeba Staff
Manager
Should I delete the file? I have some services blocked because of that.


No. It's a log file, for crying out loud! God forbid your site getting blocked every time someone attacks it! This completely defeats the purpose of protecting your site.

Please contact them and let them know that their detection software is broken. If your host is blocking your site because of a non-executable log file and they can't fix then they don't know what they are doing. In this case you should just move your site to a hosting company that actually knows what it's doing.

Also, why I can't access the administrator? AdminTools popup window comes up and I enter the username and password and it will redirect me to the frontpage.


Possibly related to the "blocked" services. Try deleting the .htaccess and .htpasswd files from your site's administrator folder.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

vrans99
What do you think about this?

nicholas
Akeeba Staff
Manager
I am searching for a diplomatic way to say this, but I have already exhausted my diplomacy in my previous replies.

Your host is overrun by stupid if they actually really think that a PLAIN TEXT LOG FILE can be "infected" as the screenshot you sent me reads. It's like saying that this image of the influenza virus is "infected", i.e. any contact with it will make you ill. If a doctor told that to me I would tell them that they are a clown and run as far away from these idiots as I can. This is EXACTLY what your host is doing. It tells you that a log file (a snapshot of an attack) is the same as the attack itself. That's incompetence of the worst kind.

After a good 15 years in the field I have determined that you cannot fix stupid. In this spirit I am asking you to move your site to a host that's not completely overrun by stupid. For example, go to SiteGround, Rochen or CloudAccess - in no particular order, these are some of the hosts I have used and didn't drive me completely insane.

I hope that this far less diplomatic reply is more clear on what I believe about your current host.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

vrans99
I have used your services for a long time now. And I trust them and I trust you.
I agree with you about a text file been infected, it makes no sense.
I believe you have great tools to offer us. I wish to have all the components I use on my sites, developed by you, with no doubt.
The Joomla community is better and have better resources with your help. And I intend to be using them until you decide to stop developing them.
But, to tell me to switch my hosting company, that I had deal with for over ten years and I host almost 30 websites with their reseller package, and to quadruple my costs using one of the companies you are suggesting, is insane. And, also, it is not my hosting company, it is cPanel Virus Scan that is detecting that. Should I change cPanel?
Instead of been angry, undiplomatic, why don't you ask me to submit that file so you can verify it?
I opened the file and it is empty. But the file use 530KB. How is that?
Maybe you are facing something that you haven't seen before. I never thought years ago that an image file could be infected, and you know they could be now.
I believe that wherever I move that file and check it with cPanel, it will give the same outcome.

vrans99
I noticed now that the permissions were set to 0000. I changed that to 644 and I was able to see the content now.
What is the right permission for this file?
Before I white list this file, I have to make sure that it is properly set and it is safe first.

nicholas
Akeeba Staff
Manager
I'm sorry, but you seem to not be reading my replies and assuming that I am angry. I am not angry, I just hate repeating myself. This is my last message before locking this thread.

Someone has tried to attack your site.

Admin Tools stopped the attack.

Admin Tools keeps a log file of all attacks it stops.

This log file is located in the file log/admintools_breaches.log where "log" is your site's log directory.

The natural permissions of this log file are 0644 as they should be for any file (owner: read and write, everyone else just read).

The log file contains a copy of all the data the attacker sent to your site. Therefore the log file contains the malicious data the attacker tried to use to attack you. This data did NOT come through. This is why it is in this log file.

The log file is a plain text file. It is not executable.

If files are cars, this file is a horse drawn carriage without horses. It cannot go anywhere.

Since this file is not executable, it cannot be "infected".

By definition, an "infected" file is an executable file which contains malicious code. When the malicious code in the infected executable file is executed in your site bad things happen.

This file not being executable means that the malicious data (not code) CANNOT be possibly executed.

Also note the distinction between malicious data and malicious code. The log file does not contain any code. Code is instructions which can be executed to do something. This file is devoid of such content.

Therefore we have a file which has not any executable code, malicious or otherwise, and is also not executable.

As a result, you cannot call it "infected" in any possible way.

Even though this file contains malicious data, this file is NOT parsed in any way by anything else. This is why it's called a log file.

As a result, this is a completely inert file.

Therefore calling it "infected" is a mistake of the code which reports it as "infected".

We did not write that broken detection code.

This broken detection code is not part of cPanel proper.

This broken detection code is something that your host has installed on their hosting environment and which they made accessible through cPanel.

Their broken detection code misidentifed an inert file as "infected". As a result it did many things which I cannot in good conscience call clever or even necessary. One of these was changing the log file's permissions to 0000 which is not only unnecessary but completely pointless as well: as the owner of the file you -and any code running on your site- can change these permissions back to 0644 or whatever they want, proving that your host doesn't really know what they are doing. But I digress.

Since cPanel is an integral part of your hosting you cannot "change your cPanel" (sic) without changing hosting.

Therefore what you propose doing and what I told you would be a viable even though undiplomatic alternative is one and the same: change your hosting provider.

However I said that this is your last resort.

If you ask me what you should do, it's what I wrote in my first and second reply: contact your host.

I am going to close your ticket now since this is the fourth time I am writing the same thing. This is no logner productive. You have been told what to do, please follow my instructions. Thank you for your understanding, have a good day and good luck with your host.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

nicholas
Akeeba Staff
Manager
This ticket has now been closed.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!