Jul 9, 2012, 09:56 AM
i have the same issue.
xxx domain.com:8443 - [09/Jul/2012:03:25:26 +0200] "GET /plesk/client@72/domain@122/hosting/file-manager/ HTTP/1.1" 303 0 "https://domain.com:8443/plesk/client@72/domain@122/hosting/file-manager/edit/?cmd=chdir&file=/httpdoc
s/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/15.0.1084.56 Safari/546.5"
Jul 9, 2012, 10:04 AM
I've changed my admin password.
IgorG: I use PBAS. If I change the user's passwords, won't that break the connection to PBAS?
Jul 9, 2012, 10:55 AM
Hi. How did you identify which client account was being used?
Jul 9, 2012, 11:01 AM
Can I also ask, as I am having same problem, Applied the patch, and still getting hacked several times per day. See http://nakedsecurity.sophos.com/2012...and-blackhole/ for details of how we are being hacked.
When changing ALL passwords, does also equal user email passwords? Thanks
Jul 9, 2012, 11:06 AM
/var/log/audit/audit.log and /var/log/secure.log.* are your friends.
You'll have to convert from unix epoch to human readable time on audit.log.
You can marry up the user authenticating via the plesk admin panel with the users present in either of those log files by using the timestamp.
That'll let you know which user was compromised.
However, the only way to be sure an attacker cannot repeat the hack using a different username / password combination is to change all the unix user passwords, so that would be site / hosting users etc..
I wouldn't imagine mail users would have this issue as they are virtual users and not unix users.
Jul 9, 2012, 11:10 AM
I've changed only my admin password for now, and emptied the session table. Waiting to see it it happens again.
Note that on Windows the SQL or MySQL password is really hard to find.
I also have the complication of PBAS and Expand that prevents me from upgrading my Plesk installs.
Jul 9, 2012, 11:15 AM
According to this site: http://blog.unmaskparasites.com/2012...andom-domains/ the problem is Plesk-specific and brings up an interesting issue. If hackers are gaining access to Plesk, and the servers have already been patched, then either:
1. There's another bug, or
2. Our databases were dumped months ago
Option 2 is especially scary.
Jul 9, 2012, 01:47 PM
Unfortunately, option 2 is highly probable.
Originally Posted by markytx
I guess, hackers grabbed Plesk databases and then suspended their violent activity about 2-2.5 months ago in order to lull Plesk owners' vigilance.
Now we are observing new round of the exploit that is based on the grabbed Plesk databases.
Please follow "Best Practices" from http://kb.parallels.com/113321.
Sorry for the inconvenience.
Jul 10, 2012, 09:48 AM
Our development team created small executable to remove the script virus pattern from .htm, .html, .php, .asp, .css for windows based plesk control panel websites. We will provide the link soon for all plesk cp users.
Jul 10, 2012, 10:26 AM
I'll have to say that "Option 2" is unlikely, *not* highly probable.
We had changed all the passwords as per the KB, and in less than 24 hours they were back in again with the new passwords. They hacked Plesk again using all the newly generated passwords.
Jul 10, 2012, 10:37 AM
Did you delete all of the current sessions before changing the passwords?
Originally Posted by galaxy
Jul 10, 2012, 12:22 PM
The server was rebooted before and after (to assure it was clean).
Also, the PBAS server was rebooted...
Last edited by galaxy; Jul 10, 2012 at 01:19 PM.
Jul 10, 2012, 01:22 PM
I don't know enough about Plesk's inner workings to know if a reboot clears the sessions table.
Originally Posted by galaxy
Jul 10, 2012, 01:54 PM
Just restarting plesk is enough. Rebooting is overkill, but you know you have a clean webserver and other services as well, and the caches are cleared. Try it yourself (before and after checking active sessions).
Jul 10, 2012, 02:37 PM
Hello, galaxy. Could you, please, provide a bit more information? How have you discovered "they hacked"?
Originally Posted by galaxy
Have you found new infected files? Have you explored log files for operations with infected files? How long "they hacked" your server after you change passwords and clean up sessions? Is this possible someone (your client) changed passwords back? We'd be grateful you to give us as much information as possible about what's happened.
You should understand that we can fix the issue with your assistance only. Thanks.
Last edited by sergius; Jul 12, 2012 at 02:59 PM.
Jul 10, 2012, 04:37 PM
Just got cleared up. As the parallels guys are saying, they harvested the psa databases for passwords before the patch was released. So back in febuary, when the patch was released was the time to change all the passwords on ALL your servers running Plesk. On a couple of our boxes we didnt see any suspicious entries in the logs so we assumed that those servers were safe enough. We were wrong, they uploaded their scripts, but luckily we found them quickly and dealt with the situation.
What we really need to know is does anyone have the logs from the initial harvest of passwords, did they take the complete database or just plesk and ftp passwords, do we need to change email passwords aswell if we are running mail on the same servers?
Can we look forward to the plesk agent API being locked down in 9.x?
Jul 10, 2012, 09:59 PM
How do you monitor login attempts via sw-cp-serverd? I want to see logs of the login attempts (which hopefully fail now after the password changes) before I can be certain that the patch fixed the security issue.
Jul 11, 2012, 12:52 AM
Jsvirusfixer - download link
You can download the the virus fixer executable for windows plesk servers from below link jsvirusfixer
Jul 11, 2012, 03:01 AM
Thanks for great script
Originally Posted by GopalakrishnanA
Jul 11, 2012, 05:14 AM
had the break in at february, installed patch and cleaned the system.
on 9.7 and 10.7 however, there were successfully break ins.
they modified the files and placed the maleware java script.
however, i couldn't find any ftp logins? so can anyone tell me
how they modified the files without using ftp?
on some of the webpages there are even dynamic php scripts
which could be used to place code in files...