8
Yes, oemr.org.
I appreciate the input a lot.
I have been examining the files with (hopefully) wiser eyes. The malicious files are owned by the apache web server and have the same owner and group permission as my Apache web server process.
To me this implicates a registered user who is posting this somehow using the XOOPS software, possibly using the newbb or the wiwimod to load the malicious software.
I need to start logging which users are posting if possible. This is likely someone very familiar with the behavior of XOOPS to be able to insert the files in the cache/, templates_c/, and updates/ directories using XOOPS and the Apache webserver.
I am running XOOPS 2.2.3a. I have the following modules installed:
System
Private Messaging
Extended Profiles
Wiwimod
C-Jay Content
News
CBB
The files were in
uploads/ Chase Bank scam
cache/ Paypal scam
These were javascripts that redirect users to previously hacked web servers. The user had inserted malicious files into into poorly secured web servers (inappropriate file ownership permissions). The Chase Bank scam has already been closed by the owner of the hacked web page. I have contacted the administrator of the site that contains the PayPal scam and asked them to remove the malicious files.
I would like to identify the user and prosecute them if possible.
Any thoughts?
Sam Bowen