Malware Must Die! has done a great, and extensive write-up on the subject of hacked and abused FTP sites (accounts). This topic fits well within my daily routine investigating and closing down hacked websites, for which I have to use various techniques for finding those hacked sites. As you might know, website security is one of the major themes of this site.

This writing is dedicated to fellow sysadmins all over the networks in this globe, who work hard keeping internet services running smoothly and help to clean the bad stuff, you rocks! Respect!

Thank you! :-)

Even if you are not in the sysadmin business, but are running a commercial or hobby website, I recommend you to read this. It’s filled with information as to why hacked websites and FTP accounts are bad and must be closed.

If you are having an experience as a system administration in an ISP, IDC or etc internet portal, security issues is part of the job description; you’ll deal with IDS alerts, IR cases, and some claims to follow in your watched network territory. In my day work, I am receiving the cases escalated to my mailboxes from sysadmins of various services for those cases. If you are a “sysadmin” maybe this post will be a fine reading to you.

This post is a story of a reported case, is also “sharable”, thank you to our friend “Yin”, a smart & efficient sysadmin which kindly tipping me suspicious sites suspected serving malicious service / activities, and allowing MMD to post the case here. According to Yin, the information was “extracted” from IDS information as an attempted PHP RFI attacks.

I was reported 6 cases in a form of 6 urls, I digged in to every url to find out the whole scheme of the threat, and as result, is rather big in volume and it looks it will take too long to analyze & write all of them, so I split the post into two parts Part 1 and Part 2, this is the Part one contains the 3 abused FTP sites analyzed, with the details that can be read from following sections. Enjoy!

Read on at Malware Must Die!, A journey to abused FTP sites (story of: Shells, Malware, Bots, DDoS & Spam) – Part 1

Read this too:   Binary webshell through OPcache in PHP 7
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *