dkchapuis — 2013-04-12T16:22:25-04:00 — #1
A website that is built in dreamweaver has a kryptic Trojan, and I am not sure how to clean the site. I have scanned the servers and local machine with eset and it isn't finding the source of the injections. However, if I delete the script that is the problem, the site is infected again within a day.
Here is the script that gets added to each page.
any help would be appreciated.
technobear — 2013-04-13T15:33:02-04:00 — #2
I can't help with finding the source, but if you change your file permissions to read only, it might help to stop them being altered while you track it down.
xhtmlcoder — 2013-04-13T15:53:10-04:00 — #3
Perhaps you could try the http://www.bleepingcomputer.com/ Security forums since you haven't located the infection vector. Also change your passwords.
dklynn — 2013-04-14T05:39:09-04:00 — #4
Your problem is that you have a breach in your security so (repeat of an earlier post):
Immediatly delete all FTP access except one (master for the account).
Change the master password (cPanel and FTP) to a VERY STRONG one using an http://strongpasswordgenerator.com password of sufficient length.
Use maldet scans (on an Apache server) which find and report all forms of malware (viruses, worms and SCRIPTS which can cause problems). This will enable you to find and remove scripts which can be embedded in html, php and js scripts. Repeat the maldet scans until there are no files detected then add a CRON to run maldet scans on a regular basis. Be aware that recovery will primarily consist of DELETING all html, php and js files and replacing them with originals (from your master copies).
Additionally, I use a script (via CRON) to verify that files have remain unchanged over the last xx hours for "peace of mind."
Database: If you are running WordPress or the like (database verification for admin accounts), create a new admin and delete all other admin records.
Update all "canned scripts" (e.g., WP, Zencart, etc.) and be sure that they're kept updated in order to prevent further attacks via security problems discovered in those scripts. This includes their third party plug-ins, too.
Uploaded files: Be sure to do a thorough check of any file uploaded to your website (I limit uploaded files to images and they are resized by GD before being saved to my "webspace").
Both staff members suggestions are good but too limited in scope. What you're allowing with JS like this is a barrage of SPAM being sent from your account. If you fail to close the security breach, your host should suspend your account then, failing application of good security, TERMINATE your account for breach of T&C (spamming).