My Hosting Account Was Hacked!

by bwgrit
24 replies
My hosting account was hacked and someone installed a script that is sending spam emails from one of my domains.

Can someone help me find what I'm looking for?

How can I pinpoint which domain it is and what the name of a file might be? Or any other suggestions?

Thanks,
#account #hacked #hosting
  • Profile picture of the author phpbbxpert
    It could just be an insecure contact form.

    What type of hosting is it?
    Do you have access to logs, some hosting logs email sends/receives.

    How did you find out about it?
    That should give you a clue to what domain it is coming from.
    {{ DiscussionBoard.errors[3023163].message }}
    • Profile picture of the author bwgrit
      It's on a bluehost server. they claim they "think" it may be coming from the domain my account is registered under but they aren't positive.

      I found out about it when they sent me an email suspending my account.
      {{ DiscussionBoard.errors[3023177].message }}
      • Profile picture of the author CrhisD
        Originally Posted by bwgrit View Post

        It's on a bluehost server. they claim they "think" it may be coming from the domain my account is registered under but they aren't positive.
        I wouldn't think much of a host that's not even able to trace the origin of spam originating from their own servers

        Time to get a new host I think
        {{ DiscussionBoard.errors[3024519].message }}
  • Profile picture of the author cbrauer
    Sorry to hear about that. Here are couple suggestions for you.

    Fist of all your account might not have been hacked, you can send spoof emails with the command prompt from your computer and show the sender as admin@google.com if you want.

    Second.
    Most hosting companies do weekly backups and keep them for 30 days. If you have a site with a data base where the information is stored just restore the site with a backup copy from a couple weeks ago.

    Third.
    A hosting account uses higher encription methods then most sites so you can create some pretty off the wall passwords to keep this from happening. Creat a password that a password cracker wil not find in a dictionary or number sting like this:
    Buggabo47562@ubfgh!

    The more jumbled and random a password is the longer it takes to crack. Hosting account passwords should be changed about 30 days just to keep your sites safe.

    You might want to get the email address that reported you and make sure it is spam. If you own multiple sites and sent emails to your subcribers sometimes people forget they registered with you and will mark an email as spam by mistake, this will cause a hosting company to take action.


    Best of luck
    Signature
    Jixty Is a new search engine with tons of cool features including low cost PPC. Preview full functioning websites before clicking links to ensure high quality results.

    ArticleHomestead post articles for free and share them with the world. Do follow backlinks, please only submit quality articles.
    {{ DiscussionBoard.errors[3023187].message }}
  • Profile picture of the author pomspot
    Get a new host, that sounds fishy. This really seems like their problem if you don't know what is going on?

    All mail I've seen generated by php scripts in bluehost domain accounts has the domain ID and the scripts name embedded right in the email headers, I expect for just this reason.
    {{ DiscussionBoard.errors[3025981].message }}
  • Profile picture of the author leiden
    Is it your own dedicated server or a shared account? If it's a shared server, your webhosting company should be able to locate the source of the spamming script. If they can't even tell you which script it is, they should not suspend the account. You should look for a new hosting company then.
    {{ DiscussionBoard.errors[3026695].message }}
  • Profile picture of the author mojojuju
    Originally Posted by bwgrit View Post

    My hosting account was hacked and someone installed a script that is sending spam emails from one of my domains.
    Are you speculating, or are you sure this is true?
    Signature

    :)

    {{ DiscussionBoard.errors[3027988].message }}
  • Profile picture of the author jasonthewebmaster
    Banned
    It's much more likely that your actual website was hacked rather than your hosting account.

    This could be caused by any number of factors such as file permissions, SQL injection, scripts you recently installed, and if you are using CMS like wordpress of joomla it could be from any recently installed extensions or plugins.

    Either way Bluehost sucks if they can't pinpoint the source of the script that is sending these emails. Time to get a new host LOL
    {{ DiscussionBoard.errors[3028016].message }}
  • Profile picture of the author orvn
    20 bux says you were just hit with a cross-site XSS virus, got sql injected, downloaded a theme with malicious code in it, etc.

    Relax!
    THERE IS A SIMPLE SOLUTION!



    Originally Posted by pomspot View Post

    Get a new host, that sounds fishy. This really seems like their problem if you don't know what is going on?
    Originally Posted by jasonthewebmaster View Post

    Either way Bluehost sucks if they can't pinpoint the source of the script that is sending these emails. Time to get a new host LOL
    I'm sorry, but that advice is downright stupid.

    First of all, bluehost is a pretty good hosting company. It isn't my favourite, but it's in the top 5 for non-cloud-type for sure.

    I apologize if my response sounds crass, but I've worked for a hosting company before and I know how it's a huge resource waste having some guy monitor your server segment processes all the time to determine the source of the problem. Even writing a bash script for it. A hosting environment can be a busy place!

    Maybe, eventually, some hosting companies will clean the server for you, because these sorts of attacks are on the heavy rise, but at the moment, very few hosting companies will go to the trouble of cleaning up essentially your mess. They would however, give you SSH root access in some cases to go and figure the problem out on your own.

    It is definitely not "their problem" and if you think it is, you have a ways to learn about hosting, computer networking and network exploitation.

    I do think software like Acunetix should come standard along with your control area, but at the moment, I know of no hosts who do this. I'm sure this will change in the future though.
    Signature
    Orun Bhuiyan[@orvn] [linkedin] See what I've been doing lately by visiting my marketing agency's site. SEOcial specializes in content marketing and integrated optimization. We create conversions for businesses by gracefully connecting the realms of design, development and marketing.

    {{ DiscussionBoard.errors[3028085].message }}
    • Profile picture of the author Aussie_Al
      I had 2 of my shop sites hacked back to back about 6 months ago

      Truly horrifying experience - luckily Hostgator managed to clean all the malware off and get me back up and running and google reviewed my repaired sites in double quick time and I only lost a couple of days business

      Very very upsetting at the time - but if its any consolation - you will get through it and be better off for the experience

      Hang in there!
      {{ DiscussionBoard.errors[3028132].message }}
    • Profile picture of the author jasonthewebmaster
      Banned
      Originally Posted by orvn View Post

      20 bux says you were just hit with a cross-site XSS virus, got sql injected, downloaded a theme with malicious code in it, etc.

      Relax!
      THERE IS A SIMPLE SOLUTION!






      I'm sorry, but that advice is downright stupid.

      First of all, bluehost is a pretty good hosting company. It isn't my favourite, but it's in the top 5 for non-cloud-type for sure.

      I apologize if my response sounds crass, but I've worked for a hosting company before and I know how it's a huge resource waste having some guy monitor your server segment processes all the time to determine the source of the problem. Even writing a bash script for it. A hosting environment can be a busy place!

      Maybe, eventually, some hosting companies will clean the server for you, because these sorts of attacks are on the heavy rise, but at the moment, very few hosting companies will go to the trouble of cleaning up essentially your mess. They would however, give you SSH root access in some cases to go and figure the problem out on your own.

      It is definitely not "their problem" and if you think it is, you have a ways to learn about hosting, computer networking and network exploitation.

      I do think software like Acunetix should come standard along with your control area, but at the moment, I know of no hosts who do this. I'm sure this will change in the future though.

      Actually my advice was not stupid - in MY opinion, blue host sucks... that's because I own my own network of servers and sell hosting to resellers - all that stuff about blue host being top 5... well on who's list?? not mine LOL

      Besides you said
      Originally Posted by orvn View Post

      20 bux says you were just hit with a cross-site XSS virus, got sql injected, downloaded a theme with malicious code in it, etc.
      That's what I said, you are just repeating it

      Any respectable host is responsible for virus eminating from their servers - NOT THE HOSTING CLIENT. PERIOD.
      {{ DiscussionBoard.errors[3028255].message }}
      • Profile picture of the author orvn
        Originally Posted by pomspot View Post

        That's what I said, you are just repeating it
        That's correct. The key difference is that I provided a reasonable solution directly after mentioning that.

        And not one akin to "Your bicycle's derailleur is broken! you should get a new bicycle."

        Originally Posted by pomspot View Post

        In MY opinion, blue host sucks... that's because I own my own network of servers and sell hosting to resellers - all that stuff about blue host being top 5... well on who's list?? not mine LOL.
        Oh, I don't know, how about EVERYONE'S?
        Srsly, every list I checked.. :p (and I tried to pick more web 2.0 oriented sites)

        #8 Web Hosting Reviews & Rating - Best Web Hosting 2010

        #3 TOP 10 WEB HOSTING of 2010 - Ten BEST web hosts reviews

        #9 WEB HOSTING TOP 10 • BEST WEB HOSTS December 2010

        #8 Top10Best™ Web Hosting Firms - Reviews of Best 10 Website Hosting Sites

        #1 TOP 10 Web Hosting *Best webhosting* Unlimited Space, Domain. Cheap PHP MySQL

        (all very decent review sites, btw)

        In retrospect, I was being a little abrasive and used the word "stupid" too callously though.
        It would have certainly been more civil for me to have expressed myself differently, so for it is for those poor mannerisms that I apologize.
        Signature
        Orun Bhuiyan[@orvn] [linkedin] See what I've been doing lately by visiting my marketing agency's site. SEOcial specializes in content marketing and integrated optimization. We create conversions for businesses by gracefully connecting the realms of design, development and marketing.

        {{ DiscussionBoard.errors[3028379].message }}
        • Profile picture of the author mojojuju
          I wouldn't put much faith in those "reviews". Those sites look like nothing more than lists of affiliate links to popular hosting companies. It is doubtful to me that the hosting companies listed on those sites have actually been reviewed at all, unless reviewing a hosting company entails just copying and pasting information from the hosting company's web site.

          That being said, I do think Bluehost is a good hosting company.

          Most "review" sites, like those you mentioned, shouldn't be trusted.
          Signature

          :)

          {{ DiscussionBoard.errors[3028755].message }}
          • Profile picture of the author bwgrit
            So is the consensus that Bluehost should take care of this? I'm no techie, I don't even know what to look for to get rid of something.
            {{ DiscussionBoard.errors[3028903].message }}
            • Profile picture of the author Havenhood
              FTP into your account and look for directory dates that have changed recently; this should point out any directories that may have new files or recent changes. You should have a directory or two that have dates that are recent. Look in those directories for files that don't belong, and remove them.

              NOTE:
              It's important to know what belongs and what doesn't.
              Signature

              --= -Spazzle- =--

              {{ DiscussionBoard.errors[3029194].message }}
          • Profile picture of the author orvn
            Originally Posted by mojojuju View Post

            I wouldn't put much faith in those "reviews". Those sites look like nothing more than lists of affiliate links to popular hosting companies. It is doubtful to me that the hosting companies listed on those sites have actually been reviewed at all, unless reviewing a hosting company entails just copying and pasting information from the hosting company's web site.

            That being said, I do think Bluehost is a good hosting company.

            Most "review" sites, like those you mentioned, shouldn't be trusted.
            Well, Web Hosting Geeks (the first site I linked) does not contain affiliate links, but yeah, lol, several of those do indeed. Still, you don't see Godaddy anywhere, do you? lol.

            Originally Posted by bwgrit View Post

            So is the consensus that Bluehost should take care of this? I'm no techie, I don't even know what to look for to get rid of something.
            Bluehost will not take care of this..
            Just install the free version of http://www.acunetix.com/
            Signature
            Orun Bhuiyan[@orvn] [linkedin] See what I've been doing lately by visiting my marketing agency's site. SEOcial specializes in content marketing and integrated optimization. We create conversions for businesses by gracefully connecting the realms of design, development and marketing.

            {{ DiscussionBoard.errors[3029456].message }}
            • Profile picture of the author mojojuju
              Originally Posted by orvn View Post

              Well, Web Hosting Geeks (the first site I linked) does not contain affiliate links, but yeah, lol, several of those do indeed. .
              That's not true. The site Web Hosting Geeks is chock full of affiliate links. Nine out of the ten hosts they link to are done so with affiliate links. Have a look at the header response when you follow the link to their #1 ranked host, Immotion.

              Code:
              /tmp$ wget -v http://webhostinggeeks.com/hosting.php?m=inmotion
              --2010-12-17 09:20:36--  http://webhostinggeeks.com/hosting.php?m=inmotion
              Resolving webhostinggeeks.com... 207.45.180.205
              Connecting to webhostinggeeks.com|207.45.180.205|:80... connected.
              HTTP request sent, awaiting response... 301 Moved Permanently
              Location: https://secure1.inmotionhosting.com/cgi-bin/gby/clickthru.cgi?id=whgeeks [following]
              --2010-12-17 09:20:36--  https://secure1.inmotionhosting.com/cgi-bin/gby/clickthru.cgi?id=whgeeks
              Resolving secure1.inmotionhosting.com... 216.193.251.48
              Connecting to secure1.inmotionhosting.com|216.193.251.48|:443... connected.
              HTTP request sent, awaiting response... 301 
              Location: http://www.inmotionhosting.com [following]
              --2010-12-17 09:20:37--  http://www.inmotionhosting.com/
              Resolving www.inmotionhosting.com... 216.193.251.47
              Connecting to www.inmotionhosting.com|216.193.251.47|:80... connected.
              HTTP request sent, awaiting response... 200 OK
              Length: unspecified [text/html]
              Saving to: `hosting.php?m=inmotion.3'
              Do you notice the redirects in the output above? Particularly the one that goes to:

              Code:
              https://secure1.inmotionhosting.com/cgi-bin/gby/clickthru.cgi?id=whgeeks
              This indicates that the link is a cloaked affiliate link. whgeeks is the affiliate id in this case.

              As I said before, all but 9 of the 10 links on the page you linked to at webhostinggeeks.com are cloaked affiliate links.

              Please, for your own good, take the rankings found on web hosting review sites such as these with a grain of salt.
              Signature

              :)

              {{ DiscussionBoard.errors[3032775].message }}
    • Profile picture of the author CrhisD
      Originally Posted by orvn View Post

      Maybe, eventually, some hosting companies will clean the server for you
      It's fine if they don't clean it for you, but to not even know where it's coming from?
      {{ DiscussionBoard.errors[3029494].message }}
  • Profile picture of the author BlondieWrites
    They should be able to tell you exactly what is going on and what domain it is, etc. Once you know which domain and what the problem is, you can go in and remove or correct the problem, call them, and be back up and running in just a few moments.

    Good luck!!

    Cindy
    Signature
    Content Niches

    Content Niches - Niche Content, PLR Content, One Owner Content, PLR Articles, PLR Ebooks, Ebook Content, Printables, and More.
    {{ DiscussionBoard.errors[3029469].message }}
  • Profile picture of the author kllymichele
    I guess there's no need to feel worry about my niche websites then I have this Hostgator with me ..

    @ bwgrit : You better contact your host provider that really sounds fishy im not a techie as well but to think that you're website has been hacked then its a big deal for me, hosts knows about it for sure..They can surely helps you in some other way...
    {{ DiscussionBoard.errors[3029643].message }}
  • Profile picture of the author zapseo
    I have worked on many hacked sites on hostgator.
    I have had clients who have had their websites "cleaned" by HG and was still able to find hacked files after the site was "cleaned."
    While I generally like HG -- on a recent assignment, I learned that HG does not run antivirus on client accounts.
    Incidentally, the account I was asked to check on had been infected since May 2009 (yes, that's right, 18 mos). What's worse is that one of the infections was of a particularly nasty kind of infection, known as c99shell.

    Be sure to check that the amount of storage and the amount of inodes that you use do not go beyond HG's backup limitations. If your account exceeds those numbers (read, carefully, their TOS -- ALL sections -- as the storage limitations are mentioned in one section and the inode limitations in another.) they do not back up the files on your account. And they only backup 1x/week and only keep 1 week's worth of backups.

    Live JoyFully!

    Judy
    {{ DiscussionBoard.errors[3029984].message }}
  • Profile picture of the author Yudhistira Mauris
    Just contact your hosting administrator. Tell him that your hosting account is hacked. The admin of your hosting will solve your problem
    {{ DiscussionBoard.errors[3030110].message }}
  • Profile picture of the author phpbbxpert
    Originally Posted by bwgrit View Post

    My hosting account was hacked and someone installed a script that is sending spam emails from one of my domains.
    I still do not believe this was hacked in the context that everyone is using here.

    It still sounds to me like it is header injection in an insecure contact form.
    This is very common..

    You need to somehow find out what domain it is coming from and see if it has a contact form and disable it.

    If you were actually hacked to where someone installed a script, then may may want to think about changing all of your FTP account credentials.
    {{ DiscussionBoard.errors[3030121].message }}
    • Profile picture of the author CrhisD
      Originally Posted by phpbbxpert View Post

      I still do not believe this was hacked in the context that everyone is using here.

      It still sounds to me like it is header injection in an insecure contact form.
      This is very common..

      You need to somehow find out what domain it is coming from and see if it has a contact form and disable it.

      If you were actually hacked to where someone installed a script, then may may want to think about changing all of your FTP account credentials.
      The thing is, Bluehost does not even know where it's coming from or where it's going, they're suspending his domain because they think it came from his site, and they did it without even showing him any proof (ie. they suspended his site for no good reason.)

      If they claim someone is sending spam from one of his domains, surely they would have some proof? if they do, why are they not showing it to him?
      {{ DiscussionBoard.errors[3030139].message }}

Trending Topics