News:

Wondering if this will always be free?  See why free is better.

Main Menu

Cracker on my forum

Started by Liviu Lalescu, August 11, 2024, 06:23:13 AM

Previous topic - Next topic

Liviu Lalescu

Dear SMF community,

My forum: https://lalescu.ro/liviu/fet/forum/

I had a similar problem a few years ago with 4-5 legitimate users accounts.

12 hours ago I had IP 5.180.62.7 log into a legitimate account (Spanish person) and posted a spam topic.

2 hours ago I had IP 5.180.62.4 log into another legitimate account (Arabic person).

I examined the visitors log and these visits were in an interval of 3-4 seconds, respectively, so not done by a person, but by a script. Also, I had two visits from the above second IP on 5 August, a simple "GET" for my lalescu.ro/liviu/.

My concern is security. What could/should I do?

mickjav




Kindred

Their account data was compromised and is in a spammer database.

Nothing you can do other than ban or delete the accounts..   you COULD try forcing a password change if you know that those users are real and still active
Слaва
Украинi

Please do not PM, IM or Email me with support questions.  You will get better and faster responses in the support boards.  Thank you.

"Loki is not evil, although he is certainly not a force for good. Loki is... complicated."

Liviu Lalescu

Thank you! I was trying to address the cause, not the effect. I mean I am afraid the cracker obtained from my site more information, like the hashes of all the passwords, and these two accounts might have had simpler passwords, but all the accounts are actually compromised if the cracker runs a brute force algorithm.

You say a "spammer database". How did the cracker obtain the exact login and password of two completely unrelated users? He entered the passwords from the first try.

Arantor

How did the cracker obtain login details? There are literal databases out there of login details and people tend to be pretty poor about reusing passwords.

I'd report the attack to the hosting company - clouvider.com, with times of usage if you can, and get them involved because it looks for all the world like someone using their hosting to break into places.

If you're afraid of the accounts having been broken into some other way, that the attacker somehow has the hash, the question becomes whether you were always on 2.1, whether you upgraded from 2.0 to 2.1 and if you upgraded, whether the users in question had logged in since the upgrade.

Realistically if the users had been users since 2.1 was on your site, the attacker did not bruteforce their accounts via having the hashes somehow because bcrypt takes an inordinate amount of time to bruteforce (that being the point), and infinitely more likely that the attacker was trying low hanging fruit from existing databases, especially cases where the same username/password pair came up in several password troves.
Holder of controversial views, all of which my own.


shawnb61

We are seeing more & more old accounts being hacked.  Similar thread with explanation & some helpful resources here:
https://www.simplemachines.org/community/index.php?msg=4176845
A question worth asking is born in experience & driven by necessity. - Fripp

Liviu Lalescu

Thank you, @shawnb61 , I had Low password security and made it High.

I am not sure my database password is strong enough, but I cannot find it in the Admin section of my SMF forum. I should make it a strong one, I suppose. Could you tell me where to find it? Maybe it was in a php file of the forum? How can I change it without breaking the forum? I think I need to modify it in two places?

Thank you, @Arantor , I will write now to this hosting company. Thank you for the explanation of the thing with hashes. However, the question remains that today the attacker logged in directly to these two accounts (separated by ~10 hours), without other similar IP's for other tries. I had firstly SMF 2.0 (or even earlier and upgraded to 2.0 long time ago, I am not sure). I updated to SMF 2.1 a few days after the release, I think. My forum Spanish user I think logged in after I updated to 2.1; my Arabic forum user seems not to have logged in after I updated to 2.1, because my site raw logs show that the attacker accepted the new agreement.

Kindred

Database password is set in your hosting account and only USED by smf, not set by smf
Слaва
Украинi

Please do not PM, IM or Email me with support questions.  You will get better and faster responses in the support boards.  Thank you.

"Loki is not evil, although he is certainly not a force for good. Loki is... complicated."

Liviu Lalescu

#8
Exactly; so, to change it, I should put the forum in maintenance, change it on my host, update it in SMF (but where?), and turn off maintenance? Sorry for newbie question.

Edit: I found that the database password is stored in Settings.php of the forum. I had a good password, no need to change it.

Liviu Lalescu

#9
And another maybe newbie question: how can I reset the password of a user, so that he is forced to set a new one by an email link? Is it possible?

Edit: I found advice in shawnb61's post above that probably also the users' emails are compromised, so I just banned these two users, and in the ban description I told them to contact me. Anyway, they were inactive for a long time.

Liviu Lalescu

I have the third probably cracked user account of today. The common feature is the same forum username as the forum displayed name, and Gmail account for email. Different class of IP now ( 193.176.87.60 ), which also seems suspect.

Sir Osis of Liver

Quote from: Liviu Lalescu on August 11, 2024, 09:51:50 AMAnd another maybe newbie question: how can I reset the password of a user, so that he is forced to set a new one by an email link? Is it possible?

Delete passwd in members table.
When in Emor, do as the Snamors.
                              - D. Lister

Liviu Lalescu

Thank you for the information! Indeed, I entered the database and I saw that the recent passwords are very long (they begin with $ and the tooltip says something about 60 characters), the not so recent are ~40 characters and the old ones are ~32 characters. On this occasion I remembered I converted from YaBB a very long time ago... sorry I did not remember this earlier. So the initial installation was YaBB. I just checked, and the conversion to SMF was done ~30 October 2011.

Arantor

The 32 character ones are MD5 based, the 40 character ones are SHA1 based, the longer ones are Bcrypt based.

If someone had your database, decrypting the 32 and 40 character ones would take little time at all. But that also assumes they have your database (which is fairly unlikely in practice)
Holder of controversial views, all of which my own.


Liviu Lalescu

Thank you for the explanations! Only HostGator until ~two years ago and Hosterion since then should have had access; I keep encrypted monthly backups on my hard drive.

I think the best would be to remove all the old MD5 and SHA1 ones. I might make a backup of the database and then try this. Hmm... ~3700 members... manually...

Sir Osis of Liver

#15
Bear in mind if member email has been changed, they won't be able to reset password.
When in Emor, do as the Snamors.
                              - D. Lister

Liviu Lalescu

Actually, I thought of this. I prefer this (these very old users who did not login in a long time can email me), than to allow attackers to see their password (in hopes they did not see them until now).

Sir Osis of Liver

You might consider posting a message at top of forum (news fader) advising members that they may not be able to login or reset password due to security issue, and give them a link to contact you.
When in Emor, do as the Snamors.
                              - D. Lister

Liviu Lalescu

Indeed, I will try. But since they did not log in for many years, I doubt they will see it.

shawnb61

That's why I change their passwords & put a 55% watch on them.

I suspect odds are lower that the email is compromised.  Mainly because folks are probably prompted by their email provider to do password maintenance.

If they come back & do it again, on a post that requires approval, that's when we know their email is compromised.  At that point, I'd ban or delete them.

A question worth asking is born in experience & driven by necessity. - Fripp

Advertisement: