The following malware has been uploaded to “ojs/public” directory as a gif file.
It looks like a user image that a user uploaded to his profile:
/home4/insanbil/.trash/jhumansciences_old/ojs/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/.trash/jhumansciences_old/ojs3213/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/.trash/jhumansciences_old/ojsBACK/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/public_html/jhumansciences/ojs/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/public_html/jhumansciences/ojs3213/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/public_html/jhumansciences/ojsBACK/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
Our journal is closed by hosting staff.
I have deleted above files. And waiting they open it again.
Question is that how can we prevent to upload that kind of malware files again?
I don’t know if I’m understanding this properly.
Do you mind to check the date of those “vuln.gif” files?
“Control public files” plugin was enabled (excluding gifs) BEFORE the gif images where created?
If yes… it could be related with a security issue that was fixed last week.
Basically, you need to remove your “/var/www/html/lib/pkp/lib/vendor/moxiecode/plupload/examples” folder and double-check your installation to see if your system is secure or during the hack they left any malicious file.
Thanks Marc for your concideration
I just today installed the “Control public files” plugin.
And server stuff scanned our site today, no malicious file found.
I have had manually removed the above malicious files in which they send to me their scanning output report.
This is scanning report that shows malware found.
I post it because thought that it may be informative about what kind of scanning process used.
Maybe OJS staffs want to create a malware scanner plugin.
/home4/insanbil/.trash/jhumansciences_old/ojs/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/.trash/jhumansciences_old/ojs3213/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/.trash/jhumansciences_old/ojsBACK/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/public_html/jhumansciences/ojs/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/public_html/jhumansciences/ojs3213/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
/home4/insanbil/public_html/jhumansciences/ojsBACK/public/site/images/olufwarrior/vuln.gif: SL-PHP-HACKEDBY-md5-alwk.UNOFFICIAL FOUND
----------- SCAN SUMMARY -----------
Known viruses: 2120530
Engine version: devel-clamav-0.99-beta1-632-g8a582c7
Scanned directories: 83766
Scanned files: 256383
Infected files: 6
Data scanned: 5591.64 MB
Data read: 152360.90 MB (ratio 0.04:1)
Time: 3661.970 sec (61 m 1 s)