It is a world wide campaign. Also
XOOPS France users have reported this problem.
From my Apache logs, I get them regulary with following pattern:
GET /modules/newbb/index.php
GET /register.php
GET /modules/profile/register.php (par redirect)
POST /modules/profile/register.php
GET /modules/newbb/index.php
POST /user.php (not always)
GET /user.php?xoops_redirect=%2Fuser.php&PHPSESSID=xxx (not always)
Done by IP: 219.157.200.19, 221.236.180.178, 68.169.137.67, 188.92.74.83, 58.68.9.242, 86.197.145.201, 75.135.132.235, 24.144.201.189, 207.62.142.147, 219.157.200.19, 143.90.221.194, 8.9.209.2, 24.42.110.110, 95.172.24.210, 218.102.129.141, 121.96.179.27
Until now, none of them succeeded (knockin' wood).
The multitude of IP and the fact that sometimes the IP changes during the sequence, prove that this is done trough a botnet.
It started mid august.
It seems that it can solve the captcha. Has anybody logs to sustain that?
I think it is maybe possible to block the registration by adding a field that is obliged to fill in during registration on the first page. I think you should set the preference for saving between pages to off.
@preachur: which captcha did you install exactly?
If the white page came after submitting the form, then there must be something wrong with the code that is verifying the Captcha. Can you show an extract of your change?
If you have no interest in the users of the places with the botted computers, block their net with .htaccess eg for 74.53.160.210
order allow,deny
allow from all
deny from 74.52.0.0/14
@Peekay: The user agents looks normal eg:
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.2; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
Also the referrer is correct: /modules/profile/register.php
To know more about the post on register, we need a way to log the posted query.