Pridať komentár

Príspevok, na ktorý odpovedáte

Re: ochrana webserveru 02.08.2012 | 02:21
miiisa   Návštevník
okay,netreba kukat.

Hi
Unfortunately attackers managed to gain access to edit one of the files on our link server, injecting a common malware exploit via means of an iframe pointing to another site. As this happened outside of our normal working hours, with links still being served alongside this malicious content, we were not notified of the issue until a few hours later. This means that any requests for new links made during this time period brought with them this exploited code, which may have caused warnings on your site from some anti-virus systems. From our investigation there is nothing that indicates that the hackers have in any way been able to utilize our link display code to directly infect our users’ sites; our link server was pushing the iframe code directly to our users’ servers as if it were normal links.

We have since located and addressed the exploited code and we are working to locate the source of the attack and tighten security to ensure it does not happen again.

In the meantime, we recommend that you completely delete your cache folder to make certain that your site is no longer displaying the malware. Your link cache is typically a folder located in the root of your site and is called “automaticbacklinks_cache”. If your site uses additional caching systems, such as Wordpress, Joomla or Drupal built-in output caching, you will also need to purge this cache. We will additionally be refreshing all displayed links to purge out any remaining issues from our members sites.

If you were unfortunate enough to have had the malicious code displayed on your site and also to have had your site crawled by Google during this time you may need to consult this page for more information: http://support.google.com/webmasters/bin/answer.py?hl=en&answer=168328

While we have yet to see any direct evidence of the attackers having accessed our databases, there is a possibility that the intruders gained access to our main database containing information such as user names, hashed and salted passwords and PayPal e-mail addresses.

As we do not store user passwords in plaintext or store any PayPal passwords or credit card details ourselves there is little risk of authentication or financial data being misused, however it is good practice to use long, strong passwords, change them frequently and not reuse the same password for several sites/services and we recommend that you carry out this practise if you do not already.

The investigation into this issue is ongoing: we treat this incident very seriously and are currently investigating its origin and will hand any relevant information over to the authorities.

We are deeply sorry for any inconvenience this may have caused you and are doing everything in our power to guarantee that something like this will not happen again.
Regards
Helen
7 - 5 plus tisíc (číslom)

Maximálna veľkosť je: 2,0 MB