Hi Xavier and vio -
wondering if either of you hav eany thoughts.....
i still have problems with theagileeffect.com. the owner of the domain is in the UK and he is not aware of any of this, and the hacks are coming from the philippines. i went thru my cpanel and replaced every file (tons of hikashop files] that were changed the same exact date and time as the original hack. the site is still getting hijacked! i think im about to rebuild the site - just reinstall the database and the few custom css files. i have a few questions....
1 regarding your comment .... hikashop is not on the vulnerable extensions list for joomla. i only have joomlapack, admintools and DJ image slider module installed on the latest joomla 1.5. shouldnt be any security holes... ?
2. greengeeks insists its not a server issue - maybe not - but is their security enough for an ecommerce site? [do you trust this technology?] should i still get a dedicated server?
their response REgarding suPHP:
>>>>>Thank you for your inquiry, GreenGeeks has developed a service which is essentially the same as SiteGround with a few benefits with our development. SiteGround uses a service called suPHP which insures PHP and executable scripts can only read/write/delete content if owned by the user. This means if a hacker was to target cPanel user "abccom" it cannot effect cPanel user "defcom".
At GreenGeeks we take this process one step further, well GreenGeeks uses suPHP we have also created a complete Lightweight Tenant Isolation system. This essentially creates a Cloud/VPS environment for each cPanel user. Each user is provided with its own Virtual File System Structure insuring that no hacker can emulate or attack another user, but also allows us to provide specific resources limitations to each cPanel account. This insures no user can become abusive and slow down another user on the server.<<<
their response regarding open_basedir:
>>>>
; open_basedir, if set, limits all file operations to the defined directory
; and below. This directive makes most sense if used in a per-directory
; or per-virtualhost web server configuration file. This directive is
; *NOT* affected by whether Safe Mode is turned On or Off.
;open_basedir =
Don't worry we are using the latest mod security rules and security plugin cageFS.
CageFS is a virtualized file system and a set of tools to contain each user in its own 'cage'. Each customer will have its own fully functional CageFS, with all the system files, tools, etc...
The benefits of CageFS are:
• Only safe binaries are available to user
• User will not see any other users, and would have no way to detect presence of other users & their user names on the server
• User will not be able to see server configuration files, such as Apache config files.
• User's will have limited view of /proc file system, and will not be able to see other' users processes
At the same time, user's environment will be fully functional, and user should not feel in any way restricted. No adjustments to user's scripts are needed. CageFS will cage any scripts execution done via:
• Apache (suexec, suPHP, mod_fcgid, mod_fastcgi)
• LiteSpeed Web Server
• Cron Jobs
• SSH
• Any other PAM enabled service
3. if i wipe the whole site and rebuild from scratch, do i have to do anything to my host account first before any first step to rebuild? like, "bleach" it ? could the hack be hidden as far back as my domain registrar or soemthing crazy like that?? can i rebuild on the same domain? or should i build it somewhere else and transfer it back once its secure. i would think the original domain is a vulnerable target now....
4. once root directory is wiped and disinfected, i probably should immediately upload special php files like open_basedir [green geeks wont let me do that though] or php.ini or something?
5. could the hack be in my database somewhere?
thank you very very much. im not a very good bug zapper :/