mpower 1 Posted May 26, 2020 Share Posted May 26, 2020 In Chrome and Opera (not in Firefox) the JS/Spy.Agent.AH malware is being found be Eset. The malware was found in https://example.com/checkout/onepage/, so it does not say in which file. How do I know where the malware is hidden? Any advice? This is how it looks like in the logs: Thanks! Link to post Share on other sites
Administrators Marcos 3,591 Posted May 26, 2020 Administrators Share Posted May 26, 2020 It should be exactly that page. However, I'm getting 404 "page not found" when trying to download it. Link to post Share on other sites
mpower 1 Posted May 26, 2020 Author Share Posted May 26, 2020 Yeah, Its not the real domain, I changed it :-). Is the malware in a JS file or could it also be PHP? Link to post Share on other sites
mpower 1 Posted May 26, 2020 Author Share Posted May 26, 2020 @Marcos: Sent you a private message 🙂 Link to post Share on other sites
Administrators Marcos 3,591 Posted May 26, 2020 Administrators Share Posted May 26, 2020 The website is really infected. In this case, the malicious JS is detected by several AVs, not only by ESET: Link to post Share on other sites
mpower 1 Posted May 26, 2020 Author Share Posted May 26, 2020 Alright, can you give me a hint how to get the infected files? Â Thanks! Link to post Share on other sites
itman 937 Posted May 26, 2020 Share Posted May 26, 2020 52 minutes ago, mpower said: Alright, can you give me a hint how to get the infected files? Why in the world would you want to do this? Link to post Share on other sites
Administrators Marcos 3,591 Posted May 26, 2020 Administrators Share Posted May 26, 2020 Are you an administrator of the website? Link to post Share on other sites
mpower 1 Posted May 26, 2020 Author Share Posted May 26, 2020 (edited) Yes, I am the sites admin (should have mentioned that 😀) and I want to replace the infected files with the none infected version. If I knew the paths to the files(s) it would be no problem ... Edited May 27, 2020 by mpower Link to post Share on other sites
mpower 1 Posted May 27, 2020 Author Share Posted May 27, 2020 I took a code backup and deleted the old code which made it work again. Thanks for your answers guys Link to post Share on other sites
Most Valued Members Nightowl 102 Posted May 27, 2020 Most Valued Members Share Posted May 27, 2020 57 minutes ago, mpower said: I took a code backup and deleted the old code which made it work again. Thanks for your answers guys There should be JS reference in your code that is linking to another script from another place where your detection has triggered , or it's hosted in your website which means they can access and upload files to the server You should secure the server more , so you can make sure that they cannot inject a JS again. Link to post Share on other sites
mpower 1 Posted May 27, 2020 Author Share Posted May 27, 2020 Yeah, I told my customer to change FTP/SSH and database passwords already ... Thanks! Nightowl 1 Link to post Share on other sites
Recommended Posts