Tuesday, 3 March 2015

C99Shell not dead


In today's blog post, we'll talk about C99shell - a powerful PHP backdoor.

Introduction
Analysis
Disinfection
Prevention
Conclusion



Introduction


I recently got contacted on Twitter in regards to a hacked webpage:



After I received the files two things became apparent:

  • the webserver (and thus the website) was infected with C99shell;
  • the webserver was infected with other PHP backdoors.


Analysis

PHP/c99shell or simply c99shell should be well known by now - it is a PHP backdoor that provides a lot of functionality, for example:


  • run shell commands;
  • download/upload files from and to the server (FTP functionality);
  • full access to all files on the hard disk;
  • self-delete functionality.
  • ...


In short, it can pretty much do everything you want, which results in end-users getting malware onto their systems and/or data getting stolen and/or personal information compromised.

There's an excellent blog post over at Malwaremustdie in regards to C99shell, you can read it here:
How EVIL the PHP/C99Shell can be? From SQL Dumper, Hacktools, to Trojan Distributor Future?


Now, here's one of the files gathered from the webserver:




It's heavily obfuscated as one would expect; after some deobfuscating/decoding we get:




It also has a nice web interface:









Seems like we are dealing with a slightly updated version of C99shell, version 2.1:








And last but not least, some functionality:














You can find the decoded C99shell backdoor on Pastebin:
Decoded PHP/c99shell

Detections aren't too great for this PHP backdoor, but it surely has improved since Malwaremustdie started blogging about it, some VirusTotal results: 0, 1, 2.


As I mentioned before, other PHP backdoors were present, for example:








After some manual decoding, we turn up with the following interesting line:
getenv(HTTP_X_UP_CALLING_LINE_ID);

Another example:
getenv(HTTP_X_NOKIA_ALIAS);

The "x-headers" HTTP_X_UP_CALLING_LINE_ID and HTTP_X_NOKIA_ALIAS are actually part of WML, the Wireless Markup Language.

Thus, this PHP backdoor seems specifically designed to target mobile users. I've put a copy of the script in screenshot above on Pastebin as well:
Unknown PHP backdoor

Darryl from Kahu Security has written an excellent post on how to manually decode this kind of PHP obfuscation: Deobfuscating a Wicked-Looking Script

If you have any information on what kind of PHP backdoor this might be (if not generic), feel free to let me know.



Disinfection

What if your website's already been hacked and serving up malware to the unknowing visitor? Best practice is to simply take your website offline and restore from an earlier back-up. (don't forget to verify if your back-up isn't infected as well!)

If that's not a possibility for whatever reason, you'll first need to find where any malicious code was injected (or created) on your website, or how it was infected in the first place.

An easy way would be to simply check all recently changed files on your web server. However, those dates can be altered. So what's a better alternative? You can comb over the files one by one, or you can use an online tool to check your website.

A short overview:

http://sitecheck.sucuri.net/
You can use Sucuri's SiteCheck to quickly spot if they detect any malware, see if you're blacklisted and, the most useful part in this case is to check whether or not you have any outdated plugin or CMS running - as well as a list of links.

http://aw-snap.info/file-viewer/
Use Redleg's file viewer to easily see if any malicious iframes have been injected - you can even choose which Referrer and User Agent should be used (some malware requires you to visit the site via a specific Referrer or User Agent).

http://www.rexswain.com/httpview.html
Useful additional tool to Redleg's file viewer. Allows you to only fetch headers of a website, or fetch both header and content.

http://jsunpack.jeek.org/
Excellent tool in case any malicious Javascript (iframe) is injected into any of your web server files. Less intuitive, but provides a great overview.

http://urlquery.net/
Excellent tool and more graphical as opposed to JSunpack - especially useful is to see if any IDS was triggered as well as JavaScript and HTTP Transactions.

https://www.virustotal.com/
As usual, VirusTotal is a great resource as well - it can pinpoint which Antivirus (if any) is triggering an alert related to your website.

https://hackertarget.com/wordpress-security-scan/
Online WordPress Security Scanner to test vulnerabilities of a WordPress installation. Checks include application security, WordPress plugins, hosting environment and web server.

https://github.com/nbs-system/php-malware-finder
NBS System's PHP Malware Finder does its very best to detect obfuscated/dodgy code as well as files using PHP functions often used in malwares/webshells.

https://github.com/sullo/nikto
Nikto web server scanner.

If nothing is found using any of these tools, but you are still receiving reports from either blacklists (eg. Google) or users, you'll have to manually go over all your files to see if any code was attached.

If you're hosting a web server yourself, you obviously know where you've installed it, so be sure to check in there. If you're not sure where it's installed, may want to look in any of these default locations, if they exist:

Linux:
  • /var/www/
  • /var/www/html
  • var/lib/tomcat7/webapps
Windows:
  • C:\inetpub
  • C:\inetpub\wwwroot\
  • ...


 Another method (and obviously not foolproof) is to copy over all your files to a Windows system and scan them with an antivirus. An example of such antivirus, which works on both Linux and Windows, is ClamAV. I think you're starting to realize why back-ups are important.

If you had any outdated plugins running, chances are very high the backdoor or script was created/added in that specific directory. For example for WordPress this is typically:
/www/wp-content/plugins/

You can also install a plugin for your CMS which can scan your web server for any infected files. (Which is ironic, but might still do the trick should you not be able to find anything manually.)

Last but not least: check your access logs! See any unauthorized (FTP) logins for example? Take a look in any of these locations:

  • /var/log/httpd 
  • var/log/nginx  
  • /var/log/apache
  • /var/log/apache2


You may also want to take a peek in:
/var/log

Contact your hosting provider - they might be able to provide you with assistance.

If you're still stuck, feel free to shoot me an email or contact me on Twitter. Otherwise, contact one of X companies which can help you assist in clean-up.

Don't forget: after clean-up, reset all your passwords (and don't use the same for everything) and follow the prevention tips above, or you'll simply get infected again.
Additionally, always install relevant security patches or updates for your operating system if you are hosting the web server yourself.




Prevention

This shouldn't be repeated normally, but I will again just for good measure:

  • Create back-ups regularly! Yes, even for your website.
  • Keep your CMS up-to-date; whether you use WordPress, Joomla, Drupal, ... 
  • Keep your installed plugins up-to-date. Remove any unnecessary plugins.
  • Use strong passwords for your FTP account(s), as well as for your CMS/admin panel login.
  • Use appropriate file permissions - meaning don't use 777 everywhere. (seriously, don't)
  • Depending on how you manage your website - keep your operating system up-to-date and, if applicable, install and update antivirus software.
  • Consider using a tool like Splunk to monitor your access logs. 
  • Consider installing a security plugin. For WordPress, you have a plugin called All In One WordPress Security which has a ton of options to better secure your website.Don't forget to keep this one up-to-date as well.

More (extended) tips can be found over at StopBadware:
Preventing badware: Basics

There are also guides available on how to harden your specific CMS installation, for example:

WordPress: Hardening WordPress
Joomla: Security Checklist/Joomla! Setup
Drupal: Writing secure code




Conclusion

C99shell is obviously not dead and neither are other PHP backdoors - or any other malware for that matter. Securing your website is not only beneficial for you, but also for your customers and other visitors. This blog post should have provided you with the essentials on securing your website and cleaning it up should it ever be infected

Repeating: best practice is to take your website offline and restore from a back-up.




Resources

For webmasters:
StopBadware - My site has badware
Google - If your site is infected
Redleg - If you're having redirects ("Google says my site is redirecting to a malicious or spam site.")

For researchers:
Online JavaScript Beautifier - http://jsbeautifier.org/
PHP Formatter - http://beta.phpformatter.com/
Kahu Security tools - http://www.kahusecurity.com/tools/
(for this specific blog post, PHP Converter is a must-use and very effective tool)
Base 64 Decoder - http://www.opinionatedgeek.com/dotnet/tools/Base64Decode/

Above list is obviously my own personal flavor, feel free to leave a comment with your favorite tool.

AUD/USD Forex Report 3rd March 2015 Monthly report

AUD/USD Primary & Weekly cycles

Support resides around .7555-7567

Price continues to consolidate around the 2015 lows, without reaching MAJOR Support around .7567

Unless there's a breakout above the Monthly & Quarterly 50% level @ .7937, there is a bias to move lower.

Keep an eye on next week's Weekly lows, as a thrust pattern upwards from those lows (Random support) and a breakout above the Weekly highs, can see a Quarterly recovery towards .8311

Commodity prices holding back the AUD (Read GOLD & Silver Reports)

Monday, 23 February 2015

Auslogics BoostSpeed Serial Keys
















Auslogics BoostSpeed
Auslogics BoostSpeed is the ideal solution to keep your PC running faster, cleaner and error-free. This powerful optimization suite will boost Internet connections, tweak Windows to its peak performance, clean registry and block annoying ads. It’s a great way to keep your computer clean and optimized.Modify Windows settings, file system and services to greatly increase system performance. BoostSpeed will keep monitoring your system for possible optimizations and let you know if such optimizations are possible. You can also run the System Optimization Wizard to periodically optimize your PC.
Features
  • Be notified when your system can be optimized.
  • Improve Internet connection performance with Internet Optimization Wizard.
  • Tweak every aspect of your Internet connection manually.
  • View connections statistics, bytes sent/received and traffic by graph.
  • Optimize Internet Explorer, Mozilla, Opera browser.
  • Increase your Windows performance, optimize system memory.
  • Optimize Microsoft Office components.
  • Stop banner ads with Banner Killer.
  • Check your system for possible optimizations in one go.
How To Activate?
Serial Keys
  1. Download & Install the latest version.
  2. Register using any Given Key.
  3. Enjoy
Serial Keys[Any Version]
12AXT-5DLF7-B9Z1O-9D261-563AL
B2AVN-8E467-Q921G-9UXB8-NM3AI
B2A4A-A2O57-O9D12-9RJA4-AA3AZ
Y2AXN-6A067-C901P-9ERB1-WZ3AM
X2AGO-3FQZ7-A9O10-9FY1A-8F3A3
X2AS3-328F7-79W1K-9A745-483AI
M2AHC-DD467-V9K19-9YLB1-OX3A6
22AL5-3C6B7-E9S16-9JLE9-CO3A8
22AW0-5CF67-99Y1N-9BG54-NU3AJ
X2ARL-376A7-59U1I-97U7B-R03AG
02AID-BAUF7-B9P11-9GT81-0S3A5
P2ALO-E56S7-19Q1D-92SE3-3L3AC
S2ALG-EAGL7-19P1E-93K8C-DF3AB
32AZB-89RF7-E931Q-9GF85-O83AO
X2AFR-38PU7-A9N11-9FUDF-KC3A3
M2AHF-C6087-V9J18-9XP83-KY3A5
A2A59-E4YE7-I971W-9LI7E-I53AT
12AW5-E1QG7-B901O-9DEDA-A63AM
02ANL-86JZ7-J9X19-9OPCF-EH3AB
W2AJB-C2W57-D9R14-9IL56-FL3A7
52ANG-0C697-H9U17-9LW27-CM3AA
F2A95-83PM7-O9D11-9PFA2-AC3AY
G2ABR-B6BF7-O9D12-9R021-V53AZ
Y2AUL-ED4C7-A9Z1N-9BO6C-053AK
W2ASJ-63NJ7-A9X1M-9BG51-WF3AJ
T2AOX-C5IV7-19Q1E-946FB-3L3AC
U2ARG-361K7-49T1I-97Q57-MB3AF
K2AEQ-7DTF7-S9H16-9VZ58-D63A3
W2ARU-0DNP7-59U1J-98423-8G3AG
C2AWB-9E7Q7-R941I-9VLA1-P63AK
K2A3P-CEP07-X9A1N-91518-VD3AQ
Q2A9N-F9P77-39F1T-97307-WK3AV
Z2AM4-C1Q87-K9X19-9N2FB-XT3AC
O2A87-1CBF7-19F1T-96N90-IS3AV
T2ACZ-790S7-69K1X-9B943-I73A0
Y2AGA-E81M7-89M1Z-9DV79-VX3A1
D2AAF-19RD7-O9D12-9QPBB-B43AY
G2A0S-ABZX7-U971L-9Z814-5A3AN
X2AI2-EB647-B9P12-9GIC5-CH3A5
S2AOU-DDIW7-29Q1E-94456-3N3AC
92ATH-BC6H7-N911F-9SRD1-PX3AH
02AJQ-05CT7-C9Q13-9H639-I63A6
R2AMY-ADSN7-Z9O1D-9273A-DD3AA
N2AI1-7EX07-W9J18-9XGA7-5O3A5
N2AI1-7EX07-W9J18-9XGA7-5O3A5
62AQU-6FTJ7-J9X1A-9P485-CZ3AD
22AMZ-37VF7-F9T16-9KF1E-1S3A9
R2AFT-769K7-B9O11-9FW91-433A3
H2AFQ-C7OI7-T9I16-9VZ08-893A4
G2A15-3F107-U971K-9ZLBA-7D3AM
Y2AHR-6CEF7-A9N10-9ED9D-8Q3A2
42AZH-7E4R7-C901P-9EX32-DF3AM
O2AIR-82F07-W9L18-9Y135-ZR3A6
V2AED-368R7-89L1Y-9BZE8-223A0
S2AB7-78QN7-39H1U-98TF7-KY3AW
R2ABN-24KN7-39H1U-98945-EY3AX
I2A2Q-48IY7-V981M-9ZC54-C83AO
O2A7E-93W97-09E1Q-95U70-3M3AT
T2AQN-07LM7-39S1G-96W75-6C3AE
Important
If after sometime any of the serial key stops working use another serial key or generate another key using keygen.
When none of the keys are working comment below, they will be updated

Windows Server 2012 R2 ISO & Key



















Windows Server 2012
At the heart of the Microsoft Cloud OS vision, Windows Server 2012 R2 brings Microsoft’s experience delivering global-scale cloud services into your infrastructure with new features and enhancements in virtualisation, management, storage, networking, virtual desktop infrastructure, access and information protection, the web and application platform, and more.
Product Keys 
  1. Server Essentials – K2XGM-NMBT3-2R6Q8-WF2FK-P36R2
  2. Server Standard – DBGBW-NPF86-BJVTX-K3WKJ-MTB6V
  3. Server Datacenter – Y4TGP-NPTV9-HTC2H-7MGQ3-DV4TW

Uniblue Driver Scanner 2015 with Serial Keys

















Uniblue Driver Scanner 2015
Old drivers may cause a range of problems, from diminished hardware functionality to conflicts and system crashes. Although drivers are available for free and can be updated manually, identifying outdated drivers can take a long time. Moreover, pinpointing just the right driver from the manufacturer’s website, downloading and installing it can be laborious and technically risky.
DriverScanner scans your computer to provide a list of drivers that need to be updated. With single-click convenience, DriverScanner will then search and download the latest updates and safely install them on your PC.
Features
  • Keep you hardware up to date with the very latest drivers.
  • Download drivers quickly and reliably from one centralized location.
  • Keep restore-points with each driver update for maximum safety.
  • Install each new driver quickly and with ease.
  • Enjoy an elegant but simple to use interface Update drivers for 32 or 64-bit systems running Windows XP, Windows Vista ,Windows 7 or Windows 8.
How To Activate?
  1. Download & Install the latest version.[Install a fresh copy if you have used patch,cracks,etc.]
  2. Insert the serial key, while connected to internet .
  3. Click Activate
  4. Enjoy!