First, this site exploit does not appear to be due to an ExpressionEngine vulnerability. I wanted to get that out of the way, and I also want to say that if this thread isn’t in the appropriate forum, then please move it. I just wanted to alert folks who host with Network Solutions. This problem appears to be related only to Network Solutions (or at least Google tells me so). Here’s a thread talking about the same exploit that I found: http://www.yabbforum.com/community/YaBB.pl?num=1204295319/11
I put hacked in quotes because I guess that’s what is happening here.
One of my clients’ hosting accounts is through Network Solutions, and tonight while trying to access the EE control panel, my browser (Firefox 2.0.0.12) displayed a javascript alert and also fired up the Java platform. Java then wanted me to run a weird applet, which I immediately exited and I also closed the javascript alert popup.
I noticed that the browser status bar was transferring information to “lunahodiki.com”, which I Googled for info, but didn’t come up with any worthwhile results.
I took a look at the source code on the control panel index page and noticed an included iframe at the bottom of the page. The iframe’s source was pointing to x-traffic.info which apparently is where the original javascript alert was trying to redirect me to and also caused the Java platform to launch.
I tried to access the Network Solutions FTP account, but found that I was locked out (not really a surprise), so I had to configure another ftp account through Network Solutions’ control panel. When I was finally able to access the site via FTP, I noticed quite a few new files that had been created on March 16, and all of EE’s index.html and index.php files had been modified to include the iframe snippet.
Being super paranoid, I backed everything up and pretty much wiped everything (that I could) clean by deleting and re-installing. Luckily, I don’t think the site’s “normal” visitors were ever at risk because I had created all its templates via the EE control panel and there weren’t any “actual” index files that the public sees which this hack seems to have exploited.
So, to summarize, folks who host with Network Solutions, check your sites for files that have recently been changed (not by you)!
I hope this is helpful and I hope that no one else has to go through the trouble that I had to tonight! Good luck!