On Tue, October 8, 2013 3:02 pm, Stan Hoeppner wrote:
> On 10/7/2013 9:10 PM, li...@sbt.net.au wrote:

> Without the log entries Simon asked for we can't do anything more to
> help you, as we don't know how the spam is being injected.  Please provide
> logging that demonstrates the problem.

Stan, thanks,

sorry, I thought that part was sufficient in my message:

> there is a php script on their web as so, I'm trying to see how it was
> uploaded at this point:
>
> ---------------------
>  head  xmlrpcVZY.php

there was a php script uploaded and called

Oct  7 23:53:07 postfix/pickup[27638]: DA64B3829CE: uid=48
from=<lola_cl...@dom.tld>
Oct  7 23:53:07 postfix/qmgr[10092]: DA64B3829CE:
from=<lola_cl...@dom.tld>, size=891, nrcpt=1 (queue active)

...
Oct  7 23:53:07 geko postfix/pickup[27638]: DA64B3829CE: uid=48
from=<lola_cl...@dom.tld>

216.187.94.181 - - [08/Oct/2013:15:07:17 +1100] "POST /xmlrpcVZY.php
HTTP/1.1" 404 211 "-" "-"

---------------------------------

I've removed the script, I stopped ftp (it seems it was ftp'd)

at the time I've posted, I was on a 4" mobile, and, I was looking for a
stop gap measure to 'stop further damage' from that point




Reply via email to