<div style="display:inline;float:right;margin-left:1em"><g:plusone href="https://www.searchenginegenie.com/blog-seo/joomla-hacking-problem-reported-a-warning-message/"></g:plusone></div>
<div style="display:inline;float:right;margin-left:1em"><g:plusone href="https://www.searchenginegenie.com/blog-seo/joomla-hacking-problem-reported-a-warning-message/"></g:plusone></div>
{"id":502,"date":"2008-05-26T16:26:00","date_gmt":"2008-05-26T20:26:00","guid":{"rendered":"http:\/\/www.searchenginegenie.com\/blog-seo\/joomla-hacking-problem-reported-a-warning-message\/"},"modified":"2012-09-20T01:43:57","modified_gmt":"2012-09-20T05:43:57","slug":"joomla-hacking-problem-reported-a-warning-message","status":"publish","type":"post","link":"https:\/\/www.searchenginegenie.com\/blog-seo\/joomla-hacking-problem-reported-a-warning-message\/","title":{"rendered":"Joomla hacking problem reported &#8211; a warning message"},"content":{"rendered":"<p>A poster in <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_0\">webworkshop<\/span> forum posted this<\/p>\n<p>&#8220;I have uncovered some malicious activity on my website which seems to be based around a <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_1\">Joomla<\/span>\/server vulnerability. I am still analysing the extent of the problem but here is what I have found so far. After performing a <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_2\">backlink<\/span> check on my website I noticed a lot of links coming into the website with an anchor text of &#8220;F&#8221;. Many of these websites seem to be genuine businesses (whether they actually are or not is still being debated), however the link itself was hidden in a mass of hidden links only visible by disabling <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_3\">CSS<\/span>. When I say a mass of links I am taking 100s. After further investigation I found the cause of the problem, a script file called <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_4\">phpgw<\/span>.<span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_5\">php<\/span>. Somehow the server has been hacked and the file called <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_6\">phpgw<\/span>.<span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_7\">php<\/span> had been placed in a folder called &#8220;images\/stories&#8221;. From what I can see this script pulls in the template file for the website and modifies the code to contain the spam links. The story continues&#8230;.I pulled up the access logs for the website and there was only one reference to the <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_8\">phpgw<\/span> file from the <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_9\">IP<\/span> address 212.62.97.20, a Saudi Arabian company who seem to be known for content spamming and malicious linking, see the following URL: http:\/\/www.projecthoneypot.org\/i_b387d0cd6f471d4ce6e0535228689b7d Whether this is a server issue or a <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_10\">Joomla<\/span> issue is still <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_11\">un<\/span> clarified (I assume it&#8217;s a bit of both) but I warn <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_12\">Joomla<\/span> users to disable <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_13\">CSS<\/span>, check for <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_14\">spammy<\/span> links, and check the server for the <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_15\">phpgw<\/span>.<span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_16\">php<\/span> file. I&#8217;m still looking into the situation so I&#8217;ll update you all if I find out anything else. &#8220;<\/p>\n<p>This looks like an issue that needs immediate attention since link injection is not only bad for your site but very bad for <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_17\">SEO<\/span>. If Google crawls your site and find links to <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_18\">spammy<\/span> websites it will ban your site temporarily or in rare cases permanently out of their index. We had a client face the same problem where his site was hacked and he got the following email from Google<\/p>\n<blockquote><p>&#8220;<br \/>Dear site owner or webmaster of ***********,<br \/>While we were<br \/>indexing your <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_19\">webpages<\/span>, we detected that some of your pages were using<br \/>techniques that are outside our quality guidelines, which can be found here:<br \/>http:\/\/www.google.com\/webmasters\/guidelines.html. This appears to be because<br \/>your site has been modified by a third party. Typically, the offending party<br \/>gains access to an insecure directory that has open permissions. Many times,<br \/>they will upload files or modify existing ones, which then show up as spam in<br \/>our index.<br \/>The following is some example hidden text we found at<br \/>****************<\/p>\n<p>*<br \/>*<br \/>*<br \/>In order to preserve the quality of our search engine, we have<br \/>temporarily removed some of your <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_20\">webpages<\/span> from our search results.<\/p><\/blockquote>\n<p>The mail from Google was actually longer which is cut short here. Matt <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_21\">cutts<\/span> <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_22\">webspam<\/span> head also posted an entry in his blog on how to help hacked sites <a href=\"http:\/\/www.mattcutts.com\/blog\/helping-hacked-sites\/\">http:\/\/www.mattcutts.com\/blog\/helping-hacked-sites\/<\/a><\/p>\n<p>You can see from <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_23\">matt&#8217;s<\/span> post that Google is not happy with hacked website with malicious and spam links. I warn everyone who use vulnerable content management systems like <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_24\">Drupal<\/span>, <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_25\">WordPress<\/span>, <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_26\">Joomla<\/span> etc to patch all possible vulnerabilities.<\/p>\n<p>If you are using <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_27\">wordpress<\/span> i recommend downloading the latest version <a href=\"http:\/\/wordpress.org\/download\/\">http:\/\/wordpress.org\/download\/<\/a> and installing on your server<\/p>\n<p>For <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_28\">Drupal<\/span> too latest version works.<\/p>\n<p>For <span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_29\">joomla<\/span> if you find installing the latest version all over a bit difficult i recommend just patching all the loopholes using their security extensions here <a href=\"http:\/\/extensions.joomla.org\/index.php?option=com_mtree&amp;task=listcats&amp;cat_id=1802&amp;Itemid=35\">http:\/\/extensions.joomla.org\/index.php?option=com_mtree&amp;task=<span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_30\">listcats<\/span>&amp;cat_id=1802&amp;<span class=\"blsp-spelling-error\" id=\"SPELLING_ERROR_31\">Itemid<\/span>=35<\/a><\/p>\n<p>Have a safe site Google and every search engines love sites that are user friendly and safe for browsing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A poster in webworkshop forum posted this &#8220;I have uncovered some malicious activity on my website which seems to be based around a Joomla\/server vulnerability. I am still analysing the extent of the problem but here is what I have found so far. After performing a backlink check on my website I noticed a lot [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-502","post","type-post","status-publish","format-standard","hentry","category-google"],"_links":{"self":[{"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/posts\/502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/comments?post=502"}],"version-history":[{"count":1,"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/posts\/502\/revisions"}],"predecessor-version":[{"id":1111,"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/posts\/502\/revisions\/1111"}],"wp:attachment":[{"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/media?parent=502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/categories?post=502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.searchenginegenie.com\/blog-seo\/wp-json\/wp\/v2\/tags?post=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}