Post by tomeda » Sun Jun 12, 2022 1:18 am

Got me with the same thing injected into the default google analytics module of OC3.0.3.8, so neither there is a security hole in that module, or it's someone we gave admin access.

If the affected users can contact me in private and share some thoughts about the developers they gave access to, because I have some suspicions of a very famous module developer, I've given two people access to this particular website, so either is one or the other?

OpenCart SEO Services
http://tomeda.bg


User avatar
New member

Posts

Joined
Thu Mar 19, 2015 4:48 am


Post by ADD Creative » Sun Jun 12, 2022 2:24 am

tomeda wrote:
Sun Jun 12, 2022 1:18 am
Got me with the same thing injected into the default google analytics module of OC3.0.3.8, so neither there is a security hole in that module, or it's someone we gave admin access.

If the affected users can contact me in private and share some thoughts about the developers they gave access to, because I have some suspicions of a very famous module developer, I've given two people access to this particular website, so either is one or the other?
It is probably far more likely a vulnerability in a theme of extension has been exploited. For example the Journal them has had issues in the past. You would be best to compare what theme and extensions your are using to see if there is anything in common.

www.add-creative.co.uk


Guru Member

Posts

Joined
Sat Jan 14, 2012 1:02 am
Location - United Kingdom

Post by EvolveWebHosting » Sat Jun 18, 2022 4:51 am

tomeda wrote:
Sun Jun 12, 2022 1:18 am
Got me with the same thing injected into the default google analytics module of OC3.0.3.8, so neither there is a security hole in that module, or it's someone we gave admin access.

If the affected users can contact me in private and share some thoughts about the developers they gave access to, because I have some suspicions of a very famous module developer, I've given two people access to this particular website, so either is one or the other?
It's extremely difficult to detect how a hacker got in. It could have been from emailing the credentials in plain text and they were picked off, it could have been from access to your control panel, FTP access or vulnerabilities in any of the software you're using. It could also be from a server that is not properly hardened. Best recommendation is to get your site protected by a firewall and keep all of your software updated and passwords strong and unique. When you're giving access to a developer, give them their own account credentials and disable / delete it from your site as soon as they're finished.

Opencart Hosting Plans, Domain Registration, Microsoft and Google Email and More
Visit our website for great deals and most importantly, fast and friendly support - www.evolvewebhosting.com


User avatar
Active Member

Posts

Joined
Fri Mar 27, 2015 11:13 pm
Location - Denver, Colorado, USA

Post by nickpapoutsis » Sat Jul 16, 2022 11:05 pm

tomeda wrote:
Sun Jun 12, 2022 1:18 am
If the affected users can contact me in private and share some thoughts about the developers they gave access to, because I have some suspicions of a very famous module developer, I've given two people access to this particular website, so either is one or the other?
The chances someone does it manually are pretty much zero.

I have found the code in half a dozen websites and it's always the same format, enough new lines to "hide" the code below the fold and a fake Analytics snippet that talks to some fox or similar domain.
Because the new lines are there even when there's other code that already pushes the virus below the fold we can assume it's an automatic process that installs the default "Google Analytics" extension, enables it and pastes the code in.

I don't remember if every single affected website was using Journal but the ones I remember were indeed using it.

On top of that, two weeks ago I came across some virus hidden inside public_html/admin/view/image/payment/note that was doing the same thing (was around 15 files in total creating some kind of webpage on the fly). Funnily enough it was ESET that detected it even though I had the site's backup files sitting in my computer since May or so. Also, this specific website was using "OpenCart GDPR" extension which looked like a pirated extension. Since I neither built nor maintain the website I have no idea who installed it but I wouldn't be surprised if the virus was in the installation file.

User avatar
New member

Posts

Joined
Mon Mar 25, 2019 7:49 am
Who is online

Users browsing this forum: No registered users and 8 guests