Is that the link to the alert as I have checked that out an no alert ?
Check the avast! Log Viewer (right click the avast ‘a’ icon), Warning section, this contains information on all avast detections. C:\Program Files\Alwil Software\Avast4\ashLogV.exe
Or check the source file using notepad C:\Program Files\Alwil Software\Avast4\DATA\log\Warning.log and copy and paste the entry.
When posting URLs to suspect sites, change the http to hXXp so the link isn’t active (clickable) avoiding accidental exposure.
However there is a rather strange looking script tag on the home page after the closing HTML tag, a bit of a standards no, no. So you could check out that and see if it should be there. Looks like it is trying to create an obfuscated scritp tag and that may be what the redirect is about, see image.
OK, looks like there is a lot of work to do in cleaning these files as I suspect that they too may have been hacked.
You will also have to edit your list to break the links to suspect locations, like I have done in the quote above.
This looks like content management software possibly being exploited:
This is commonly down to old content management software being vulnerable, PHP, Joomla, Wordpress, SQL, etc. etc. see this example of a HOSTs response to a hacked site.
We have patched up the server and we found a weakness in PHP which was helping aid the compromise of some domains. We updated it, and changed some default settings to help prevent these coding compromises. The weaknesses were not server wide but rather just made it easier on a hacker to compromise individual end user accounts.
I suggest the following clean up procedure for both your accounts:
check all index pages for any signs of java script injected into their coding. On windows servers check any “default.aspx” or
“default.cfm” pages as those are popular targets too.
Remove any “rouge” files or php scripts uploaded by the hackers into your account. Such scripts allowed them to make account wide
changes, spam through your account, or spread their own .htaccess files through all of your domains in that end user.
Check all .htaccess files, as hackers like to load re-directs into them.
Change all passwords for that end user account. The cp password, the ftp password, and any ftp sub accounts. Make sure to use a
“strong” password which includes upper case, lower case, numbers and NO COMPLETE WORDS OR NAMES!
This coupled with our server side changes should prevent any resurfacing of the hackers efforts. In some cases you may still have coding which allows for injection. All user input fields hidden or not should be hard coded, filtered, and sanitized before being handed off to php or a database which will prevent coding characters from being submitted and run through your software.
Ok, I just spent a good while going through a lot of my files on my website. In most of the php files there is a weird code that looks a lot like this:
/GNU GPL/try{window.onload=function} (and then a bunch of random type characters that go on for about 8 lines, and then ends with append.child, catch and then the end of script)
I was afraid to post the actual code here...anyway, is that the virus??? Do I just delete that code from each file that contains it??
Thanks,
Lezlie
Wise choice not to post the script…could cause more problems than good…
I have checked, and that seems to be the code that is causing the alert from avast!
What you will need to do is as you said, delete it from all of the files that contain it, and also follow the instructions set out by DavidR to prevent re-infection.
I actually upgrade the script to remove JS:Illredir-B and JS:Illredir-C in same time
If you got some other similar trojan on your website please contact me i try to help and upgrade the script.
Yesterday I ran across a site that has this trojan – no problem, though: I had Avast installed, which warned me and aborted the download. Then I googled the name of the trojan and discovered this forum.
Looks like the site has been hacked there is an obfuscated script tag at the bottom of the source code (see image, click it to expand). The script is obfuscated to hide its purpose and is suspicious, the line extends way, way, beyond the end of the image example.
HI my website is affected by the same virus also, can you send me the script to remove the virus ? as detected i suspected the virus contented is JS:Illredir-C
can you send the script to my fifa76@gmail.com. thank you
First we aren’t clairvoyant so we need to know what your site URL is, change the http to hxxp to break the link.
Even if we know your site address, we can’t send you any script to remove it you have to find the injected script, remove it and close the vulnerability that allowed the script to be injected.
I suggest you remove your email address as a) it can get harvested by spambots trawling the internet and b) we help people through the forums and not email.