Bob,

If they had a folder on a desktop, you have to assume that your server was hacked, rooted, and your account was exploited. The safest thing to do would be to change all of your administrative passwords everywhere on your network, and rebuild that server from a formatted disk. You could of course try to save the installation, but I have seen many such servers re-hacked and that suggests that being rooted is more common than not. Firewalling everything that isn't absolutely necessary is also very wise, and may have prevented this in the first place.

They probably made their way in through some OS, service or scripting hack. Common targets of phishers is often any tool that allows uploads of one form or another such as content management systems/wiki's or discussion boards. For instance, PHP-Nuke is a favorite, and anything that comes with a control panel hosting environment.

Lots of luck,

Matt


Bob McGregor wrote:

this is a bit off-topic but

we had one of our servers last night have the ebay spoof page loaded on it. 
Anyone have info as to how this gets loaded and, more imporantly how to keep it 
from happening?

The only things I found was the htm page that was referenced in the spam e-mail 
and a folder on the desktop named sign in_files with the images associated with 
the page.

I want to keep it from happening again.

thanks, bob



---
This E-mail came from the Declude.Virus mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.Virus".    The archives can be found
at http://www.mail-archive.com.





---
This E-mail came from the Declude.Virus mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.Virus".    The archives can be found
at http://www.mail-archive.com.

Reply via email to