Skip to main content

How to quickly fix a base64-infected website

Base64 attacks are becoming more and more common these days. They involve exploiting a PHP vulnerability on a website and injecting malicious, base64-obfuscated code. The main targets
of such attacks are poorly coded plugins that feature security holes.
The encoded code is decoded when the infected .php file is loaded and the actual attack is carried out. A popular attack is to forward a website to another page, which grants the attacker an affiliate
bonus.
Here is an example of what a base64 hack looks like in a .php file:
eval(base64_decode
("dGhpcyBpcyBhIHRlc3Q=")); – this code will output "this is a test" when decoded.
A regular base64 code snippet will be significantly longer.
On our web hosting platform, there are several ways to deal with such hacks:

Restore a backup
With our cloud hosting accounts, we offer multiple daily backups, so anyone can easily revert to a previous version of a website with just a click. And we keep backups for up to 30 days.

Here is how to choose the correct backup:
– Log into the Hepsia Control Panel and navigate to the File Manager section;
– Head to the folder pertaining to the hacked website;
– Sort the files by modified date;
This way, anyone can see when the files were last updated. When there
are multiple .php files that were updated 10 days ago, simply load an earlier backup with clean versions of those files.
If there are problems restoring a backup, our support team reps will be happy to assist.

Clean the files manually
To clean the files by hand, simply
download them to a computer and clean them using a text editor. The Windows/OSXcompatibleSublimeText or the
Windows-compatible Notepad++, both of which are available for free, will do a great job.

Once the files are downloaded, load them in the text editor and search for any base64 code. To see if there is any base64 code on the website, use the following search term:
eval(base64_decode.
Once you discover an instance, copy the actual code snippet and search again.
Simply replace the code with an empty space to get rid of it. If there are still any other base64 instances, repeat the procedure until non are left.

Regular expressions can also be used to target base64 code on the website. Again, simply replace the regex matches with an empty space to clear them from the pages.

Here is a sample regex search term: /eval\(base64_decode\((.*)\)\);/i

Keep in mind that this type of search with target all base64 instances. This means that if any plugin or element of the site is
using base64 encoding as well, it will also be removed.

Clean the files over SSH
When using terminal access, all infected files can be cleaned with just a few commands over SSH. If SSH access is not enabled for the account, it can be done with a request in the Upgrades section
of the Hepsia Control Panel.

The first thing that needs to be done is to get a sample of the infected base64 code.

Use this as a reference for cleaning all infected files.
See which files are infected by using the following command:
$ find . -type f | xargs grep
"dGhpcyBpcyBhIHRlc3Q="

This command will search for all files in the current folder that contain the following string:
"dGhpcyBpcyBhIHRlc3Q=".
Here is how the output of that command will look like:
./themes/default/single.php:<?php
eval(base64_decode
("dGhpcyBpcyBhIHRlc3Q=));
./themes/default/search.php:<?php
eval(base64_decode
("dGhpcyBpcyBhIHRlc3Q="));


This will list all the infected files in the current folder and its subfolders. Once the list is ready, it's time to eliminate the code.

We'll use the sed program and our
function will look like this:
find . -name "*.php" -print | xargs
sed -i 's@eval(base64_decode
("dGhpcyBpcyBhIHRlc3Q="));@@g'
Use the search function one more time to make sure that all the files are now clean.
If the search returns no results, the
website has been cleaned.

Preventing base64 attacks
As we've noted, a base64 hack will target a vulnerability in the code. So the best course of action is to always keep apps and plugins updated to the latest versions
available. A good rule of thumb is to only download plugins that are actually needed. If a plugin is not used anymore – remove it from the application.

Also, when downloading new plugins, always keep track of the number of downloads and the update dates. If the last update is more than one year old, the plugin in question may be susceptible to
an attack.

---------
At josidelhosting.com we take care of not just you but your site, cause you having a happy clients is you being happy with us. At discount code for all services; OJAJ
Josidel Hosting

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...