Urgent - How to get rid of JS virus on website?

by HeySal
15 replies
Has anyone gotten one of the JS viruses on their website? How do I get rid of this thing? Is it safe to just remove it or do I need to rename the file or what? The virus code is on the top of two scripts in there. I am having no luck at getting answers for this problem.
#rid #urgent #virus #website
  • Profile picture of the author Indiana
    Banned
    [DELETED]
    {{ DiscussionBoard.errors[520129].message }}
    • Profile picture of the author Mike Wright
      Originally Posted by Indiana View Post

      Salut...Anyone know how to trash this pest?...Thanks ..Indy



      Virus Profile: Exploit-PHPBB.b
      Threat Search

      Print Share
      Virus Profile information details Risk Assessment: Home Low | Corporate
      Low
      Date Discovered: 5/26/2008
      Date Added: 5/26/2008
      Origin: N/A
      Length: Varies
      Type: Trojan
      Subtype: Exploit
      DAT Required: 5303
      Removal Instructions



      a.. Overview
      b.. Virus Characteristics
      c.. Removal Instructions

      Description
      This detection is for Javascript malware that maybe hosted on a website,
      with an intention to serve further malware to users visiting the site.



      Indication of Infection
      Since the malware is hosted on the remote website, there are no visible
      symptoms on the user's machine.

      Methods of Infection
      The malicious java script itself could be served in a website using an
      IFRAME. It could also be injected into an HTML page via an SQL attack.

      Aliases
      JS/Redirector.A [Norman], JS/Redirector.E [NOD32v2], JS_REDIRECTOR.M
      [TrendMicro], Trojan.JS.Redirector.C [BitDefender], Trojan.JS.Redirector.e
      [Kaspersky], Trojan.Redirect.10 [DrWeb]
      Well, after getting infected with this damn thing while investigating
      subsequent to your email Indy, it would seem that it lurks in a bogus
      .css phpbb theme file which must be located on the server and ends up
      in our Temporary Internet Files when browsing any infected PHPBB
      forum site.

      The key identity seems to be *****[1].css
      eg something like subsilver[1].css or style{1].css.

      If this is true, then the only way to stop being re-infected is to
      delete the file off the server and replace with an original css file.
      Then look for any new PHPBB patch or latest version, change
      admin/hosting names and use secure long passwords.

      Then you can continue by cleaning out your Temp Internet Files
      on your PC with CCleaner or similar ....maybe do a regclean also
      using the relevant CCleaner tab.

      Interestingly, I caught this by visiting a Google result to a
      phpbb forum thread about this topic and got forcibly redirected
      to another phpbb forum.

      Then reboot and do an intensive Avast scan. I did, and found that
      somehow I had also picked up host.exe and rundlll (three l's).
      You will find it best to remove both of those by using Killbox
      KillBox.Net which works a treat and worth keeping

      Hope that helps you folks!
      My preferred forum software is SMF if that is a site alternative.
      {{ DiscussionBoard.errors[522069].message }}
  • Profile picture of the author HeySal
    I guess most people still don't know when they're affected with this one -- Only avast will tell them they have it at all and it doesn't remove them. Maybe that's why it's getting passed around so much.

    Serious - ANYONE at all being redirected funny with no indications of what is going on is probably infected with a redirect.
    Signature

    Sal
    When the Roads and Paths end, learn to guide yourself through the wilderness
    Beyond the Path

    {{ DiscussionBoard.errors[520305].message }}
  • Profile picture of the author GB2008
    So how did you spot that you had this virus? I'm relying on my website hosters to keep my website clear - but I am not that clear on how things like SQL injection work! Can you suggest a resource to educate me on this?
    Signature
    {{ DiscussionBoard.errors[520315].message }}
  • Profile picture of the author sannyman
    Hey, Sal!

    Two things:

    a.) Avast is well known for false positive, which is actually good in my opinion.
    My question is HOW have you figured it out?

    b.) Yesterday I had to contact "live chat" at Hostgator.com and I have received a MALWARE alarm from Avast too.. It was related to a javascript (.js)...

    So, the best way to deal with, is to contact directly AVAST support team and ask them if this is a real concern or not. And no, the service provider DOES NOT assure a virus / malware free operation of your site, unless specified in their contract with you.

    Success!
    {{ DiscussionBoard.errors[520404].message }}
  • Profile picture of the author sannyman
    @ Sal, @Indiana:

    Please give me an URL sample, if possible.
    Thank you!
    {{ DiscussionBoard.errors[520412].message }}
  • Profile picture of the author HeySal
    This is not a false positive - we've found the codes on the database -- have no clues how they got there yet. Looking into how to get them off and if it's safe to just delete them, etc.

    I am assuming at this point of time that the Host had a security breach and will be contacting them as soon as I get word back from Indy if he was able to get info from an expert pal of ours about what to do and possibly how it got there.

    Avast is the only device detecting this redirect because the algorithms are not that of virus, they are just java code - but malicious invasions nonetheless.

    The URL is in my sig "get a life" - it is the forums and Photo gallery - will trigger the Virus alert - which, as I said, is really there -we found the code. Indy tried to mail the code to me and Avast went crazy on the email. I do not know the actual code - it can't be written in whole without triggering the process so don't write it in here even if you find it without breaking it up on not completing the code.

    When we know more, Indy or I will be back in the thread and tell you what we find. I am suspecting this was the same source as the wdmaud virus that is such a pain in the butt to find and ditch - also one audio.sys that is the same vein - they are redirects and wdmaud is actually a keylogger. (Russian source) They get on your computer and allow the loggers to be downloaded. And are very high threat and very low detection.

    If you haven't scanned with avast, these are the famed viruses that are attacking millions right now - If you find the wdmaud or audio - I know how to remove those, the JS redirects, I will find out - trust me on that one.
    Signature

    Sal
    When the Roads and Paths end, learn to guide yourself through the wilderness
    Beyond the Path

    {{ DiscussionBoard.errors[520696].message }}
  • Profile picture of the author HeySal
    Found out that it is mimicking yahoo counter and that's how it gets past the virus detectors. These guys aren't messing just with websites - they are going after servers.

    Indy - put the code in here but write it hxxp so it doesn't activate - let people see what might be sitting on their websites.
    Signature

    Sal
    When the Roads and Paths end, learn to guide yourself through the wilderness
    Beyond the Path

    {{ DiscussionBoard.errors[521457].message }}
  • Profile picture of the author Indiana
    Banned
    [DELETED]
    {{ DiscussionBoard.errors[522175].message }}
    • Profile picture of the author Indiana
      Banned
      [DELETED]
      {{ DiscussionBoard.errors[522251].message }}
      • Profile picture of the author Mike Wright
        Originally Posted by Indiana View Post

        Hya Mike Well I trashed the sever side CSS then replaced it with the original...flushed the internet temp files...Still there... Gone to rat about
        see if I can spot something -o)...Indy
        Try header/footer files Indy ... plus files in the /inc dir on server.

        Its pretty much got to be somewhere which loads on index and other pages ..... so theme/style/css/header/footer seem likely places as well
        as inc files ??????

        I suppose you could always download all the site files to a new directory on computer and scan those with Avast to see if it will pick up the
        thing that way ????

        Not much fun if it has been written into the database via a SQL
        vulnerability with something like the footer copyright info for example.

        I have just completed a new thorough Avast scan of my computer
        with not a single infection or warning ...so it definitely comes from
        the serverside somewhere.

        LOL, am staying away from PHPBB sites for a while.

        PS. CTABUK's TIP was phpbb ...got hacked and is now
        on SMF for that reason ...and the SMF database migration
        script from phpbb worked ok! Hint hint hint
        {{ DiscussionBoard.errors[523027].message }}
  • Profile picture of the author RandyW32
    Mike beat me to the punch! But that should definitely work!
    {{ DiscussionBoard.errors[522534].message }}
  • Profile picture of the author tschlotter
    Just out of curiosity - does anyone have an opinion as to whether Kapersky anti-virus is better or worse than Avast?

    I used Kapersky's online scanner and free 30-day trial to fix a major problem on my computer a few weeks ago. I was almost to the point of having to reformat when I tried their software and it did the trick. My problem wasn't on my server, but they do have an extensive knowledgebase on the site that deals with website viruses, maybe that would be helpful.

    Anyway, I'm trying to decide whether or not to keep my Kapersky service when my trial is up. If Avast is as good or better, I'd much rather have a free service!!
    {{ DiscussionBoard.errors[523087].message }}
  • Profile picture of the author Indiana
    Banned
    [DELETED]
    {{ DiscussionBoard.errors[523479].message }}
    • Profile picture of the author Mike Wright
      Originally Posted by Indiana View Post

      Mike...John's on its case...The most formidable virus assasin since Louis Pasteur...IMHO...-O)...Indy
      Thats the best news I have had for a long time
      Welcome back John .... you have been missed!
      {{ DiscussionBoard.errors[525813].message }}
  • Profile picture of the author HeySal
    Just got the note from John, Indy. Never been so glad to hear from a man in my life. I'm thinking if he disappears again I might have to go to NC and marry him so he can't get away on us again.

    From my research - this is what I found - and this is as deep as I understand what was told to me.

    This thing attacks or attaches to I-Frames, source pages, etc. If you have anything on your system that involves permissions set at 777 you are vunerable - it will come straight through them. Possibly why the address of at least one of the redirects is 777 something?

    There are several versions of this thing going on - and they come back. I had the wdmaud and had to delete it manually - twice now. These are the virsuses that are attacking millions right now and only one or two applications are picking it up at all.

    Sometimes it pretends it's a yahoo counter. If you have a code for yahoo counter and you didn't put it there, you have found your culprit. Also check I-frames and source codes.

    Tschlotter - I assume the answer to your question would involve whether your Kapersky detects this virus when you get it or not.
    Signature

    Sal
    When the Roads and Paths end, learn to guide yourself through the wilderness
    Beyond the Path

    {{ DiscussionBoard.errors[523540].message }}
  • Profile picture of the author cgj1981
    I had a similar problem with one our sites Compare Schools Australia - Australian Schools Directory & Rankings but it only seems to be AVG that picks up that it is a virus (even though with its IE enhancer it detects the site as a tick and safe).

    I hope Sal you had no returns to your site but I am unsure like many in this thread have suggested whether mine is an issue or not.

    CJ
    {{ DiscussionBoard.errors[523645].message }}
  • Profile picture of the author HeySal
    LOL, Indy - Women used to want doctors - now Internet Engineers and mechanics.

    I just sweep up after them -O)...Bissou Sally...Indy
    And I just carry your mops for you and keep the crowds happy.
    Everything I know I owe to you and John. And I have only begun to tap into that well. It's such a darned deep one.

    .........signed Helpless, but not Hopelss, in WA.
    Signature

    Sal
    When the Roads and Paths end, learn to guide yourself through the wilderness
    Beyond the Path

    {{ DiscussionBoard.errors[524256].message }}
  • Profile picture of the author HeySal
    I was told by either my host or avast, don't remember which as I've been researching endlessly on this, that anything set with 777 permissions is vulnerable.

    You are right, Indy - it is highly likely it is a MYSQL attack.

    John is not saying anything until he is done with fixing this and is taking measures to disallow it to regain entry - but I won't know the bottom line on it until he is done. At this point all he has said is it is very interesting watching the "evolution"? Sounds scary at the very least. If this virus is as bad as it seems to be and as difficult to get rid of as it is now appearing to be, the answer might come out in report form in an WSO instead of in the forum. After all the work he is doing on it, he'd be deserving for finding the solution - a LOT of sites are getting hit with this one.
    Signature

    Sal
    When the Roads and Paths end, learn to guide yourself through the wilderness
    Beyond the Path

    {{ DiscussionBoard.errors[534600].message }}

Trending Topics