Concrete 5 sites read more link hack

Permalink
Hi

A couple of our Concrete 5 sites have been hacked on the home page. All of the 'read more' links have been changed to botoflegends.com. It only appears to be on the home page.

This is not an FTP hack as there has been no damage to any files, and only the read more links have been affected on the site.

Has anybody else had this issue, or has a fix for it.

Many thanks in advance,

Labber

 
enlil replied on at Permalink Reply
enlil
you have any links we could look at?
labber replied on at Permalink Reply
Sorry there are no websites we can show you since we had to change them as soon as possible. We have looked through the concrete5 logs. There was nothing in there to suggest unknown people have accessed the website. We seem to feel like it was a cache hack. Could someone have hacked the cache?

When we were logged into concrete5 the links were fine and once we republished the page, the links changed back to normal.
madesimplemedia replied on at Permalink Reply
madesimplemedia
FTP is very insecure, they could have logged in via FTP and hacked the cache files - someone correct me if I'm wrong. :)
labber replied on at Permalink Reply
I checked the cache files now and none have been edited recently
madesimplemedia replied on at Permalink Reply
madesimplemedia
A virus on your computer can locate ftp details on your machine as they are stored as plain text and use them to login to your websites - scarey! I had it happen years ago when I wasn't to savvy.

Keeping your PC/Mac protected and up to date with good anti-virus software is a must...
labber replied on at Permalink Reply
i do not have ftp details store on my pc
madesimplemedia replied on at Permalink Reply
madesimplemedia
Good to eliminate that :)
Were the links in a block?
labber replied on at Permalink Reply
They were in a designer block. An extension I downloaded from the concrete5 market place. I was advised to download this block by Concrete5 DEVELOPER TUTORIALS
madesimplemedia replied on at Permalink Reply
madesimplemedia
Is this Designer Content PRO? If so I think there was a security issue and an update was issued to fix it.
labber replied on at Permalink Reply
I am not sure. I downloaded the block mid way through last year.
madesimplemedia replied on at Permalink Reply
madesimplemedia
I would update that block/package to the latest version.
labber replied on at Permalink Reply
Ok I will. Do you have any idea how this hack works though. While I was logged in, the read more link was fine, but when I was not logged in the link washttp://botoflegends.com/about-us...

The "about-us" was my page name that the read more link was linking to.
madesimplemedia replied on at Permalink Reply
madesimplemedia
No idea to be honest, but updating that block is the easiest and quickest thing to do and hopefully it won't be hacked again.
jordanlev replied on at Permalink Reply
jordanlev
Hi,
I'm sorry to hear that you site files were compromised somehow. I unfortunately do not know how it could have been caused, but I would like to clarify some info about the Designer Content addon.

If you downloaded it for free, and if it was midway through last year, it must have been the free version (not the "Pro" version), because the Pro version costs money and wasn't released until the end of September last year (2013). The free version of Designer Content creates blocktypes for you, and once the blocktypes are made, they are completely separate files and no longer "connected" to the addon itself... so upgrading Designer Content will not have any effect (and there probably isn't an upgrade available for that anyway since the last update was before you downloaded it).

In regards to the recent Designer Content Pro update, for the record it was not a security issue -- rather it was a problem where the C5 marketplace updater was overwriting addon files when an upgrade is performed through the dashboard, and because I was (foolishly) storing user-generated addon settings in the addon directory, these settings were getting overwritten when upgraded. The problem has since been fixed, but it doesn't have anything to do with security-related issues.

Again, I don't think this has anything to do with your situation because you're using the free version (but I just wanted to explain that more clearly for other people reading this in the future).

If this happens again, what you will want to investigate is *where* exactly the bogus links are coming from. Are they "hardcoded" into the block's view.php file? Was the database updated (as if a user had logged in as admin and edited the block on the page)? Or is it none of that and perhaps instead there was some javascript injected onto the page and the javascript code was rewriting the links AFTER the page was sent to the browser. Knowing the answer to this will help narrow down the possibilities of how the attacker gained access.

Best of luck,
Jordan
madesimplemedia replied on at Permalink Reply
madesimplemedia
I just want to add - your designer content add-on is awesome, very very useful!
labber replied on at Permalink Reply
I have checked when everything was last modified. It seemed to be some sort of js injection, but I couldn't investigate for too long since we had to correct the site asap
Cahueya replied on at Permalink Reply
As I remember, to create an new block with designer content (no-pro), you need to set the permissions for /blocks to 777, which is a security issue, so you should return them as soon as you've done creating that new block.

Have you maybe forgot the secure the /blocks directory after block creation?