« FeedBurner Ad Network 收入统计终于按照时区更新了 | 首页 | Technorati 回来了,能坚持多久? »
2007年06月06日
3500个 DreamHost 用户 FTP 帐号被黑,我也不幸中招
美国西部时间6月4日晚9点左右,相当于北京时间6月5日中午12点,Plod 首页顶部开始出现奇怪的空档,查看了服务器上的页面,发现在一个小时前页面被改动,出现了内嵌 iframe,src 为 IP 加密代码转换成十六进制的 IP 地址,由于手头在线解密转换的地址一时想不起来,于是去蓝色理想发帖询问破解,很快获得地址,查询为马来西亚的 IP。进一步查看发现,所有 index.html 和 index.php 文件都被篡改添加了 iframe 代码以及数十KB的纯粹为了 SEO 的垃圾链接代码( 竟然还知道用无序列表<ul> ),有些代码添加得还算“客气”,而有些 PHP 页面则明显被结构性破坏,基本可以肯定是自动脚本所为。
随即,我便去信 DH 的客服,阐明事实,要求查证,当时正值美国西部时间的半夜,于是没有任何回音,可见 DH 所谓的24小时客服也不那么厚道。今天凌晨两点半收到客服回信,告知说经过核对 log 记录,发现我的帐号有非正常登录,可能是 FTP 账号密码被破解,希望我尽快修改密码,现在已经改成十四位高强度密码,还要进一步观察。
DH 客服一大早又连发三封紧急通知,告知说将近3500个用户 FTP 帐号被破解!其中大约两成的帐号有页面被修改迹象!我的帐号不幸也在此列。记录显示入侵者同样尝试进入 DH 内部客户信息数据库,但未得手,这的确有点让人觉得很不放心。无论如何,如果你是 DH 用户,赶紧去查证一下自己的首页代码有没有被修改,万全之策还是换个密码的好,有重要数据的记得备份......
Reply from DreamHost (Jun 5th, 2007 - 18:50:33 / #11988515)
Subject: URGENT: FTP Account Security Concerns...
From: DreamHost Security Team
Subject: URGENT: FTP Account Security Concerns...
Hello -
This email is regarding a potential security concern related to your
'popoever' FTP account.
We have detected what appears to be the exploit of a number of
accounts belonging to DreamHost customers, and it appears that your
account was one of those affected.
We're still working to determine how this occurred, but it appears
that a 3rd party found a way to obtain the password information
associated with approximately 3,500 separate FTP accounts and has
used that information to append data to the index files of customer
sites using automated scripts (primarily for search engine
optimization purposes).
Our records indicate that only roughly 20% of the accounts accessed -
less than 0.15% of the total accounts that we host - actually had
any changes made to them. Most accounts were untouched.
We ask that you do the following as soon as possible:
1. Immediately change your FTP password, as well as that of any other
accounts that may share the same password. We recommend the use of
passwords containing 8 or more random letters and numbers. You may
change your FTP password from the web panel ("Users" section, "Manage
Users" sub-section).
2. Review your hosted accounts/sites and ensure that nothing has been
uploaded or changed that you did not do yourself. Many of the
unauthorized logins did not result in changes at all (the intruder
logged in, obtained a directory listing and quickly logged back out)
but to be sure you should carefully review the full contents of your
account.
Again, only about 20% of the exploited accounts showed any
modifications, and of those the only known changes have been to site
index documents (ie. 'index.php', 'index.html', etc - though we
recommend looking for other changes as well).
It appears that the same intruder also attempted to gain direct
access to our internal customer information database, but this was
thwarted by protections we have in place to prevent such access.
Similarly, we have seen no indication that the intruder accessed
other customer account services such as email or MySQL databases.
In the last 24 hours we have made numerous significant behind-the-
scenes changes to improve internal security, including the discovery
and patching to prevent a handful of possible exploits.
We will, of course, continue to investigate the source of this
particular security breach and keep customers apprised of what we
find. Once we learn more, we will be sure to post updates as they
become available to our status weblog:
http://www.dreamhoststatus.com/
Thank you for your patience. If you have any questions or concerns,
please let us know.
- DreamHost Security Team
这次的黑客组织非常有意思,可见他们很成功地绕过了 DH 的注意力,假想 DH 的用户多数不会注意到那个隐藏的 iframe,但不幸的是 DH 有我这样的中国用户,可以洞察自己页面上的任何一点细微差异,而 DH 的通告中也透露出 DH 对安全性的监控还没有达到无缝可钻的地步,我个人认为至少这是一次人为疏忽,如果没有我们这些用户发现问题及时举报,似乎他们还没有时间去看内部网的入侵记录。同时,为了 SEO 而进行的 spamming 运动已经发展到要 hack user accounts 的地步,可见我们再也不能说这是个没技术含量的工作。
对于 DH 所言“第三方通过某些渠道获取用户密码”的说法,我持保留意见,说实话这句话实在太慎人。
Trackback Pings
本篇日志的回溯引用地址:
http://plod.popoever.com/acp630/mt-tb.cgi/1290
Comments
#179141
可怜的 POPOEVER……过来同情一下~~
为什么 POPOEVER 不换个 hosting?
Posted by Chris at 2007年06月06日 12:24 | back to top
#179142
提醒一下,popoever.com也被植入木马了
Posted by anoy at 2007年06月06日 12:30 | back to top
#179159
跟着同情一下~~看来网络还真没有安全的地方啊!
Posted by Devon at 2007年06月06日 13:28 | back to top
#179161
@Chris 我有两个 host 的帐号,主要是懒,又要迁移又要改 DNS,还要等 update,烦死了,DH 大问题没有,也就忍了~~~
@anoy 这个不是木马,只是 iframe,岂止 popoever.com,还有好几个运行在我帐号下的站点也都中招了,我已经向 DH 申请 rollback 了,手动改要出人命的。
Posted by POPOEVER at 2007年06月06日 13:29 | back to top
#179229
看来这几天先不更新了,等数据回滚以后再说。
冷汗呀~Posted by 波希米亚 at 2007年06月06日 16:52 | back to top
#179434
好像我的站点没事情??
Posted by HowJay at 2007年06月06日 21:33 | back to top
#179495
@HowJay 你站点的 FTP 帐号是你自己在 DH 注册的帐号,我只是把你的帐号绑定到我帐号的空间上,所以密码你可以自己改,改总比不改好,呵呵
Posted by POPOEVER at 2007年06月06日 22:15 | back to top
#180726
对了,POPO,你说的那个 IP 加密的代码不是就是把 10 进制的 IP 地址用 16 进制表示么,这个不算加密吧,嘿嘿
Posted by HowJay at 2007年06月07日 14:03 | back to top
#180811
@HowJay 对对对,就是你说的这个,对 TCP/IP 协议不熟悉,想半天不知道怎么说,呵呵
Posted by POPOEVER at 2007年06月07日 17:23 | back to top
#180915
俺 的没啥问题,一切正常。
Posted by 拒绝下锅的鱼 at 2007年06月07日 21:26 | back to top
#180920
解读那种一串数字表示的IP地址,最简单的办法就是直接ping它,IP地址立显~
BTW,我也用的Dreamhost,所幸并未殃及,难怪这两天服务器很不稳定。
Posted by Oasis Feng at 2007年06月07日 21:29 | back to top
#181015
我也有收到这封邮件,当时我就改了密码。
但貌似代码没有被修改的迹象。Posted by allose at 2007年06月08日 00:08 | back to top
#182880
POPOEVER,在 Opera 里面,链接提示里的文字怎么改啊?
现在的字看着好恶心……囜……Posted by Chris at 2007年06月11日 09:36 | back to top
#183437
同情一下。呵呵
Posted by 星光博客 at 2007年06月12日 09:54 | back to top
#197038
Dreamhost 是个无赖公司
奇慢!会突然关闭你网站和ftp
还会禁止搜索引擎访问,来减轻服务器负担到他吹的200g和2000流量前
就早把你账户封掉了根本不会把用户当回事的
Posted by fxxk dreamhost at 2007年06月21日 05:13 | back to top
#204878
听说国外这个虚拟主机不错!还发生这样事情,首先我表达对你同情,其次我要佩服这个黑客的技术!
Posted by wljinxin at 2007年06月25日 02:42 | back to top
#237402
我搜索了很久才看到博主的文章,我也是全部中标了,怎么改不是不行,郁闷!
Posted by tuixy at 2008年06月09日 00:08 | back to top
Post a comment
即便如此,也请遵纪守法,勿放厥辞
汝国如汝母,辱国如辱母,吾辈当自强
您的观点仅代表个人,与本站无关,望请自尊
Thanks for signing in, . Now you can comment. (sign out)
(If you haven't left a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won't appear on the entry. Thanks for waiting.)