Hi TC,
Thanks for reporting this. We take security very seriously and will do our best to work with you on figuring out what’s going on. To that, we need some additional information from you…
- Other scripts on your account, whether in use or not (phpBB, etc…)*
Expression Engine is the only script running on the site. We are using the following extensions, addons and Plugins:
Expression Engine 2.4.0
Multiple Site Manager 2.1.2
MODULES (Non-Core Additions)
—————-
Mega Upload
SEO Lite
Wygwam
ACCESSORIES
—————-
ExpressionEngine Info
MX Cloner
NSM Morphine theme
EXTENSIONS (Non-Core Additions)
—————-
MX Cloner
FIELDTYPES (Non-Core Additions)
—————-
Mega Upload
NSM TinyMCE
Wygwam
PLUGINS (Non-Core Additions)
—————-
Magpie RSS Parser
Twitter Search
XML Encode
* If this is a shared hosting environment, the host can make a determination if the attack came through scripts on another account on the server, which is commonly the case with these types of hacks.
The server techs have ruled out a server side attack. The attack was localised to the domain where the EE site was located. No other accounts were affected.
While we work through this, please check through these files:
* index.php
* admin.php
* system/index.php
* system/expressionengine/config/config.php
to ensure that there is no unusual code such as iFrames or Javascript includes; if you do find that code, then please back-up the file and remove said code. If you are unsure of what does or doesn’t belong in these files, do not hesitate to ask.
You may also wish to refresh your files by following the build update instructions.
No files in the site were altered. The attacker was careful to avoid detection by placing the malicious file in the /system/expressionengine/helpers/ directory. The file was called indexx.php
This way they avoided tripping the EE core file edit alert.
Also please ensure that you report this to your host immediately as they can help identify where the attack originated from so that steps can be taken to prevent this in the future.
All parties associated have been alerted, the issue has been resolved and all scripts have been updated.
What I am trying to ascertain is how the attacker gained access to site.
Thanks for your help
TC