• Resolved rogerpoole

    (@rogerpoole)


    Over the last year, my client’s site has been hit twice by this Pakistani group. The first time I was absolutely bewildered as to what happened and how did they dump over 100 random files into the site. I added the wordfence plugin then. About 3 weeks ago, they got hit again. I fault the client for not keeping the plugins / wordpress etc up to date. Mostly they did no monitoring at all.

    I managed to download a bunch of files from the last attack. Along with the typical support.php files with encrypted header lines, there were over 4,090 files in one directory. Mostly simple html drug ads.

    I found one php file that had an ip address written into the curl line that would grab the user agent and I’m assuming my clients domain and get a webpage. I gave it a test with a private browser window and bogus information in the url. This lead me to a page with thousands of links (all random numbers and letters). But these urls all linked to various other sites with a common directory (daqhmokdby). Doing a google search for that directory led to the top 10 links all saying “This site may harm your computer.”

    I still don’t know how they got into the site. They did not come through the front wp-admin login. I would have seen that in the dashboard. They had other access. The htaccess file was rewritten, 47MBs of files uploaded. I am assuming they have hacked the ftp login information or have hacked the hosting company and are coming from above.

    If there’s any interest from WordFence support in seeing these files, please contact me at [ redacted, support is not offered via email, Skype, IM etc. only in the forums ]

    https://wordpress.org/plugins/wordfence/

Viewing 4 replies - 1 through 4 (of 4 total)
  • Thread Starter rogerpoole

    (@rogerpoole)

    Resolved.

    How you resolved this would be appreciated by the community. AT least a hint. MTN

    Thread Starter rogerpoole

    (@rogerpoole)

    Ha! Sorry MountainGuy. I’ve basically passed the infected files to the WordFence crew to review. I’m sure the next filter will have an even better focus on the Pak Haxor hacking.

    Thread Starter rogerpoole

    (@rogerpoole)

    Hi all. Attacked again. Here’s a few of the notes on the infected files.

    • f649 infection

    • Possibly malicious lambda function

    • Many c99 variants including NFM, Perl, Predator, CTT, r57 and Redhatc99

    I did a search on the f649 infection and ultimately came to a story about the Darkleech and the hosting company. GoDaddy. Apparently GoDaddy has had issues with this for years.
    This is a root level infection that needs to be addressed by the host company, but when my client called they wanted to sell her a security service (basically SSL) for $150 year.

    Can anyone guide me as to what might be in the log files that might prove Darkleech is active? Looking for something I can send the host support and get an acknowledgement of the problem.

    Also, moving this site to a different host as soon as the client is back from vacation.

Viewing 4 replies - 1 through 4 (of 4 total)
  • The topic ‘hacked by Pak Haxor experience’ is closed to new replies.