![]() |
Comus Thumbs.com down after big hack?
|
Yes, looks like their Server is down :(
|
Yup, the site is down here in central USA as well!
|
Guessing this is the end of comus then. After this last hack i'm never using comus again anyway. I dont think the owner has giving a shit about comus for years now.
|
Quote:
|
even after deleting CT folder in your root and switichig to ST, the exploit code returns.
I'm done with CT |
Quote:
|
yup I'm affraid that's the case. working on it ;)
|
Weird. I only checked the site of comusthumbs a couple of days ago...
Anybody want to buy two spare comus licenses? :winkwink: :1orglaugh |
yesterday the site was up, but nobody in the forum mentioned about the hack
|
Quote:
I installed ST to replace CT and it was hacked within about 2 mins until i did the above. Its a bitch of a hack :Oh crap |
did you set it to 755?
|
the power of hackers ... there is always someone better, and if hackers want to put something down, they will find a way, and looks like its working ...
|
Comus users, if you looking to buy ST license for migraton I found a great deal here.
http://www.gfy.com/showthread.php?t=917058 |
oh well, shit hasn't been updated forever, what do you expect to happen
|
Assuming there is a hack and that it is based on permissions, the comus staff is to blame.
They always advised people to "just chmod the whole comus folder to 777". That's never a good idea. People should not have followed that advise in the first place. |
Quote:
I'm sure hacker running remote script that stored your login info. so it frequently injects JS/iframs code into your site files. Clean your PC with anti-spyware then change all server passwords. after that, remove the code in all files with text editor. Don't open infected webpages with browser until all removal is done. it did work for me. |
man it sucks to see such a great program go.
|
Quote:
Now i have to repair the sites and install ST over 40 times to replace CT :Oh crap |
Quote:
Also please check your /tmp folder so its set to noexec so pearl scripts cannot be ran out of this location after being uploaded. I can go on and on but thats the jist of it. |
Just checked one of my comus sites and sure enough - i've got the code being injected as well. Boo
|
Quote:
sorry to here you got the hack, good luck getting rid of it. |
i said months ago ct was gone
|
grrrr dont even know where to start right now! need to get ST installed but also get all the links to trades,sponsors ect copied and pasted to hard drive! and reading about the exploit returning after a ST install! fuck its gonna be a long weekend for me! as well as for you guys! :(
|
fuck sake, cant even get pass install.php for smart thumbs here! :(
|
Anyone know how to tighten Comus if we haven't been hacked yet? All I could think to do is change the permissions of the CT folder to 755.
|
Quote:
|
finally got thru to ST and having a go with with it to see what does what...kinda similar to comus but different interface....will be a few days till I can get my head round it and be up and running...hopefully! :)
|
Quote:
|
Quote:
|
Quote:
|
Quote:
|
too bad for comus... It was pretty good script.
I guess I'll have to make a switch over st too... |
Check your tmpl files in ct/templates directory. those are infected as well and also there are more .tmpl and .php(no Zend) files in some other dirs.
Just delete unnecessary files under the ct directory.(backups, welcome.html, example.html, old data, etc.) But again, YOU MUST SCAN YOUR PC in advance of code removal. The hacker has your ftp password. so he will inject the code again automatically. Moreover this hacker(his remote software) will scan other directories in /home. then it will attack other php sites too. My other TGPX and TEVS sites on the same box also got hit. Once the hacker has your ftp login, changing file/dir permission won't be a solution. I had found these malwares in my pc. Exploit,PDF.JS-Gen Trojan.Script.7685 These came from the injected code. Remove them and reboot. Scan again with another antispyware, reboot, then change server passwords. Now edit all infected files. Use server-side text editor or file manager. If there is a blank line under the <body> tag. Scroll to right and you will find the hidden code. DON'T load infected or suspicious php/html files with browser. Your PC will get malwares again and it will sniff new password when you using ftp. So it's the most important that your pc is not infected by malwares during code removal. Good luck. |
Spudman....see you are from the UK too :) send me a PM see if we can help each other out :)
|
can't get it here
|
Quote:
|
I wonder why the owner stopped giving a shit? It seemed like he bought out epower trader but shortly after that stopping doing much.
Did he have health problems or something or just give up? |
I remember Tony having health problems and it when down hill from there, havn't heard from him in a long time
|
Quote:
|
All times are GMT -7. The time now is 01:23 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123