On Tue, October 8, 2013 3:02 pm, Stan Hoeppner wrote: > On 10/7/2013 9:10 PM, li...@sbt.net.au wrote:
> Without the log entries Simon asked for we can't do anything more to > help you, as we don't know how the spam is being injected. Please provide > logging that demonstrates the problem. Stan, thanks, sorry, I thought that part was sufficient in my message: > there is a php script on their web as so, I'm trying to see how it was > uploaded at this point: > > --------------------- > head xmlrpcVZY.php there was a php script uploaded and called Oct 7 23:53:07 postfix/pickup[27638]: DA64B3829CE: uid=48 from=<lola_cl...@dom.tld> Oct 7 23:53:07 postfix/qmgr[10092]: DA64B3829CE: from=<lola_cl...@dom.tld>, size=891, nrcpt=1 (queue active) ... Oct 7 23:53:07 geko postfix/pickup[27638]: DA64B3829CE: uid=48 from=<lola_cl...@dom.tld> 216.187.94.181 - - [08/Oct/2013:15:07:17 +1100] "POST /xmlrpcVZY.php HTTP/1.1" 404 211 "-" "-" --------------------------------- I've removed the script, I stopped ftp (it seems it was ftp'd) at the time I've posted, I was on a 4" mobile, and, I was looking for a stop gap measure to 'stop further damage' from that point