May 25, 2019, 9:08 PM
Subject: [antasa2 162813610] Message from support.
We have received a report of phishing at the following location:
forum.webseodesigners.com/commercial-ads-and-other-spam-f4/sell-cvv-
bank-login-dumps-track-1-2-transfer-wu-pa-t1145.html?sid=27fbb1ee33fc5983641da9d
800e925f9#p1261
This means that your site has likely been compromised. We have taken the
site offline by renaming its directory (appended _DISABLED_BY_DREAMHOST).
Please do not re-enable it until you can address the problem.
In general, the three most common entry points for a compromised website
are:
1. Vulnerable, typically out-of-date software (such as blogs, forums,
CMS, associated themes and plugins, etc.)
2. A cracked/brute-forced admin login for a web application like
WordPress, Joomla, Drupal etc.
3. A compromised FTP/SFTP/SSH user password.
1. All software you have installed under your domain should always be
kept up-to-date with the most recent version available from the vendors'
website, as these often contain security patches for known issues. Older
versions of well-known and popular web software (including Wordpress,
Drupal, Joomla, etc.) are known to have vulnerabilities that can allow
injection and execution of arbitrary code.
2. If you utilize a web application with a script-based administrative
backend (like WordPress, Joomla, or Drupal), make sure that you're not
using a generic username like "admin" or "webmaster" for the user with
administrative privileges. Hackers will slowly brute-force common
usernames in order to get access to a script's backend and whatever tools
exist there that allow file uploads, alterations, or execution of code.
3. FTP/SFTP/SSH passwords can be compromised and used to modify files.
The most important part of securing your account in this case is to
change your FTP user's password via the (USERS > MANAGE USERS) -> "Edit"
area of the control panel. Passwords should not contain dictionary words
and should be a string of at least 8 mixed-case alpha characters,
numbers, and symbols. It is also recommended to always use Secure FTP
(SFTP) or SSH rather than regular FTP, which sends passwords over the
internet in plaintext. You can disable FTP for your user(s) within the
DreamHost panel (USERS > MANAGE USERS) section.
At this point, we recommend logging into your DreamHost server and
removing the content we listed. (Note: You may first need to reset the
permissions). You should also look for any other files/directories you
did not upload yourself and update all your website components where
applicable. As for determining which entry point is the cause of this
incident, for 1 and 2, you can review the Apache logs for suspicious
activity and requests to suspicious files. Keep in mind that we typically
only keep around 5 days worth of Apache logs. For 3, you can refer to
this article to find recent logins to your
user:
https://help.dreamhost.com/hc/en-us/art ... -your-site -was-hacked
For further help on this topic, you can refer to our Knowledge Base:
https://help.dreamhost.com/hc/en-us/art ... s-overview
https://help.dreamhost.com/hc/en-us/sec ... 42117-Logs
Lastly, we have scheduled an automated malware scan and if anything is
found, we will send you a separate email with those results.
If you need further assistance, please respond directly to this email.
Thank you for your cooperation!
-DreamHost Abuse Team