Hacked on the latest version


This morning we found out somebody hacked our Piwik version. I have not enough knowledge how and what, but just a heads up. These were the hacked files:

{HEX}php.base64.v23au.183 : ./plugins/DBStats/page.php
{HEX}php.base64.v23au.183 : ./plugins/Overlay/javascripts/code74.php
{HEX}php.base64.v23au.183 : ./plugins/CoreAdminHome/javascripts/code.php
{HEX}php.base64.v23au.183 : ./plugins/CorePluginsAdmin/stylesheets/error6.php
{HEX}php.base64.v23au.183 : ./plugins/ExampleTracker/lang/gallery.php
{HEX}php.base64.v23au.183 : ./libs/Zend/Config/error.php
{HEX}php.base64.v23au.183 : ./libs/bower_components/angular-cookies/footer14.php
{HEX}php.base64.v23au.183 : ./tmp/templates_c/61/article53.php
{HEX}php.base64.v23au.183 : ./vendor/monolog/monolog/css79.php

This was a default install. No directories were opened or changed onour end.

We reinstalled and hope for the best;-)

And hacked again…

Code injected and we’re on Hotmail and Gmail’s blacklists now. Bummer.

We’re tightening filerights see if will still nbe working well. Happens from within the TMP directory each time.

Hi there,

Do you run other software on the same server, such as wordpress or other applications?

it’s possible another application was used to penetrate the server and then the malware spread to piwik files.

Do you have more information or maybe logs where you can see what the intruder is doing and how he got in?


Hi Matt,

Thanks for the reply.

We had an old, almost forgotten version of OpenX on our server. The good people at Amerinoc found out from the logs that:

Yesterday, IP POST’d to the following: - - [10/Jun/2015:03:28:59 -0700] “POST /ads/var/cache/deliverycache_17df5a3abec4c54873459093462ff06e.php HTTP/1.1” 200 367 “-” "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0" - - [10/Jun/2015:06:19:17 -0700] “POST /ads/var/cache/deliverycache_8960c6a031ae926bd3076f119e938fc2.php HTTP/1.1” 200 314 “-” "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0" - - [10/Jun/2015:06:19:18 -0700] “POST /ads/var/cache/deliverycache_17df5a3abec4c54873459093462ff06e.php HTTP/1.1” 200 497 “-” “Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0”

Immediate after those last 2, it POST’d to: - - [10/Jun/2015:06:19:22 -0700] “GET /piwik/tmp/templates_c/25/diff.php HTTP/1.1” 200 363 “-” “Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0”

We updated the old OpenX version and are waiting tobe whitelisted with Spamhaus again.

Thanks (and sorry for blaming Piwik;-)).

OpenX caught me out as well on one of my sites - wasn’t pretty :frowning:

@Andy, we hardly use it but for one or two small sites, so I might have been lucky.
Hopefully all is good again now.

Not updating OpenX for 5 years sure wasn’t the smartest thing to do I’m sure. I did not even know they - again - renamed the program. It’s the 4th renaming since I first started using it.

Yeah - I remember when I first started using it, I think it was called phpMyAds (or something like that). I had the same thing where I forgot it was even there (as it wasn’t being used any more), but as always, the hackers found it and made use of the fact it was such an old version.

As you said - could have been a lot worse!