I have an EE 1.x site for an educational institution that has been repeatedly hacked in the last several months, such that publicly browsed pages are normal, but the Googlebot sees (and indexes) “Viagra”-related text and links. I’m sure some of you are familiar with this.
The actual method of the attack is a large block of base64-encoded text inserted either into the index.php file at the Web root, or into the core.system.php file (even though our “system” directory has been re-named to a very unusual word). For either file, the encoded malware is always inserted right after the statement: error_reporting(0);
Yesterday I updated from 1.7.0 to 1.7.1, and also updated all third-party add-ons. I’m using Solspace Freeform for two forms on the site. I’ve update Freeform and also turned on EE Captcha support so that the forms now have captchas. Other than that, I can’t think of any likely attack entry points. The site is on Dreamhost shared hosting. They have been helpful about cleanup, but not about figuring out the attack vector. The FTP passwords are 20-character random strings (very strong).
Nonetheless, the core.system.php file was modified again within hours of my full EE (and add-ons) update. Because the latest two attacks have modified core.system.php in a re-named system directory, I’m wondering if the malware has been tuned specifically for EE. I’m also wondering if the database has also been hacked so that an outside entry point isn’t even necessary for the attack anymore. On this point, can someone suggest what to search for in the db, or what tables are most likely to have been hit?