Block Right Click

Wednesday, 4 March 2015

‘Lizard Squad’ hacking attempt at Munim.in

‘Lizard Squad’ hacking attempt at Munim.in

 

Off lately, our website has been malfunctioning and had turned pretty slow. We had tried multiple levels of indexing but without any improvement until we received a mail from Ministry of Communications and Information Technology that "www.munim.in“  is compromised and hosting malicious code. On further probing and investigation we came to know that there has been a hacking attempt by Chinese hackers ‘Lizard Squad’.

Ministry of Communications and Information Technology has taken this issue with great gravity and helped us in retrieving/modifying our website and further we have protected our website with high level security standards approved by Web Application Security Consortium (WASC). We would like to thank you all for all your patience with our website and Ministry for timely information and help.
Letter from Ministry of Communications and Information Technology
Ref No: CERTIn-211221796
_________________________
Dear Sir/Madam,

We have received reports that the website "www.munim.in“  is compromised

and hosting malicious java_script/IFRAME  snippets. This causes visitors of
your websites unknowingly redirected to malicious
websites   which downloads malicious Trojan into their computers.
Details of the  affected pages/page:


  ht*p://munim[d0t]in/
  ht*p://www[d0t]munim[d0t]in/
  ht*p://www[d0t]munim[d0t]in/index[d0t]html
  ht*p://www[d0t]munim[d0t]in/index[d0t]html
  ht*p://www[d0t]munim[d0t]in/index[d0t]html
  ht*p://www[d0t]munim[d0t]in/index[d0t]html

Note: (added * and [d0t] to prevent the link from working)
You are requested to take following immediate actions:

• Search your Web pages (html, asp jsp, js etc) for obfuscated malicious
content.JavaScript/VBScript/IFRAME code injected by attackers. These links
are embedded in the source code of the Web page associated to an
IFRAME/script tag.
•       Remove the below malicious contents (java scripts/vbscripts/IFRAMES)
that are injected by the attackers in all the above listed web-page.
• Search for a hidden folder .sys and delete the same, if found.
• Site administrators are advised to Check htaccess, php_includes, and
other configuration settings, as well as ensuring directory permissions are
set appropriately.
• Users may consider using a firefox addon "NoScript" which pre-emptively
blocks malicious scripts and allows JavaScript, Java and other potentially
dangerous content only from the user trusted sites.
• Scan the system with Anti-virus/Anti-spyware.
• Change FTP credentials (if any) for the administrators to upload
content into your website and secure the same.
• Review the security of your Web Server and website for application and
Operating System vulnerabilities and apply appropriate patches/updates.

• Implement information security best practices such as “Use Signed
Scripting”.
• It is recommended to avoid internet browsing and remove all file shares
on the Web Server.
• Refer to the given below link for Google webmaster's help for the
hacked site.
ht*tp://www[d0t]google[d0t]com/webmasters/hacked/
- --
Thanks and Regards,

CERT-In

Incident Response Help Desk
e-mail : incident@cert-in.org.in
Phone : 1800-11-4949
FAX : 1800-11-6969
Web : http://www.cert-in.org.in
PGP Fingerprint : 4871 0429 EB42 0423 4E6A FAD6 B2D5 5C16 9E34 6D2C
PGP Key information:
http://www.cert-in.org.in/contact.htm

Postal address:
Indian Computer Emergency Response Team
Department of Information Technology
Ministry of Communications and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003

8 comments: