.htaccess and malware delivery

One of my friends saw a problem on a web site, thought I would post some of the things I learned through our private correspondence.

Contributing factors

This exploit can be avoided, but it pays to have a web hosting provider that stays on top of things and makes it easy for clients to keep their software upgraded. Unfortunately some of the “big names” are not the most reliable, so do your research well instead of just choosing brand names that sound familiar.

Something else that exacerbates the situation is that other than “certification” by the same companies that mass market flawed software (and charge plenty for the software license, training, and certification) there are no real standards for web developers nor computer consulting in general. We are in the equivalent of the situation with pharmaceutical sales before the FDA was created. Anyone can claim to be an expert to sell their particular brand of snake oil. I actually have programming, database administration, and server administration experience. I have been through the bitter experience of being “beaten out” by people who charged plenty and didn’t even know how to configure a popular FTP client program to use SFTP (secure) transfers. They never really delivered on many of their promises. This is especially bad when non-profit organizations are involved. Donor money going to reward bad behavior is an example of a very poor feedback mechanism in our market economy. Small government advocates and Tea Party supporters take note.

Reporting

I talked to an officer at the local state police barracks who confirmed that this was indeed a case of computer crime. The site owners were in the process of taking online registrations for workshop participants, so probably took a monetary hit.

If something like this happens you should file a report with your local State Police (for USA) or go through the proper channels for wherever you live. Goes without saying that you or your “professional web designer/developer” need to repair the .htaccess file and remove any scripts used in delivery of malware. Your web hosting provider should be able to provide technical support as well.

The exploit

The site in which my friend identified the problem had a “corrupted” .htaccess file that sent traffic from search engines to a second site (also in USA). That site had a PHP script hidden in a subdirectory that contained images to connect to the malware server in the Middle East — three different servers in two countries.

Other delivery mechanisms

On another friend’s site last week I saw an attempt to deliver this same malware package through an email message delivered through their contact form. The message contained a link to a news story on a major network site. You can often avoid trouble by using plain text format for all your email messages. In this case it would have not helped though, when I checked the source the URL was to the site it claimed to be. Someone had managed to get a script onto their server.

Read more

Here are some links I found which I thought explain well how the .htaccess exploit works:

http://www.provos.org/index.php?/archives/55-Using-htaccess-To-Distribute-Malware.html

http://www.64bitjungle.com/web-development/gnarly-malware-hijacks-website-htaccess-and-steals-search-engine-traffic/

http://blog.javacoolsoftware.com/2008/12/anti-virus-2009-search-engine-redirect-hacks/

Posted in Rants, Technical | Tagged , , , , , , , | Comments Off on .htaccess and malware delivery

Facebook badges

Just discovered that Facebook only lets you have one version of your profile badge.

Facebook Widgets

Since I run a static site in addition to this blog (and a number of other things), found that when I edited the badge within Facebook to go from a vertical aspect ratio, which works well in the column here, to horizontal for my contact page, there was no new source code to be seen. And, the badge here on the blog got really ugly.

So, you can have only one version of a Facebook profile badge no matter how many places you want to put it.

I suspect that a high percentage of Facebook users have no other web presence (i.e. a blog or static site) so this isn’t considered an issue.

For Facebook folks — this originated as a post on my blog which is imported into Facebook via its RSS feed. You are more than welcome to post your comments there. I don’t display Facebook comments on my blog, feel it is a privacy issue.

Posted in Rants, Technical | Tagged , | 1 Comment

Food Inc. – second chance

Food, Inc. on PBS on April 21, 2010

Food, Inc. on POV

If you missed this first time around, there is another chance. You can watch it online around air time.

Instead of getting angry or discouraged you can take an active role in:

  • reducing health care costs
  • supporting small business (farmers)
  • improving children’s performance in school
  • reducing carbon emissions
  • eating better at less cost
  • reducing pollution and toxic waste
  • protecting our water supplies

I am probably forgetting a lot more important stuff, but you get the idea. It all starts in your kitchen and when you shop for food.

Posted in Cooking, Gardening, Rants | Comments Off on Food Inc. – second chance

Bode in the snow again



IMG_6437

Originally uploaded by Kathy Graff

Forgot to click the button to save the layout I chose.

Well, guess it doesn’t hurt to have another picture of this great dog.

This is actually quite easy to use once you get your flickr account settings correct. I set up a separate non-admin user for this.

Here it is in the wee hours again. Often end up on Facebook when I am up at night.

Posted in General | Comments Off on Bode in the snow again

Bode in the snow




IMG_6437

Originally uploaded by Kathy Graff

This is a test of posting from flickr, photograph is from February 6.

Posted in General | Comments Off on Bode in the snow