Search Results for 'spam'
-
AuthorSearch Results
-
June 26, 2013 at 5:10 pm #166960
In reply to: Untraceable spam user
Ben HansenParticipantits still a bad sign that base 64 stuff is usually a sign of a open door that has been used to hack your site.
June 26, 2013 at 5:08 pm #166959In reply to: Untraceable spam user
mareksgregsParticipantThe scan found only one problem, which is:
This file may contain malicious executable code
Filename: wp-content/plugins/user-meta/framework/init.php
File type: Not a core, theme or plugin file.
Issue first detected: 45 secs ago.
Severity: Critical
Status New
This file is a PHP executable file and contains an eval() function and base64() decoding function on the same line. This is a common technique used by hackers to hide and execute code. If you know about this file you can choose to ignore it to exclude it from future scans.I wasn’t using that plugin though. It was deactivated.
June 26, 2013 at 3:21 pm #166942In reply to: Untraceable spam user
Ben HansenParticipanti think you should really check your site using that wordfence plugin as we both indicated having a user without an associated email is very suspicious.
June 26, 2013 at 8:09 am #166905In reply to: Prevent from spam messages.
HenryMemberHave you tried searching the WordPress plugin repository for something like ‘buddypress spam messages’?
A good plugin that will certainly resolve the issue is
https://wordpress.org/plugins/buddypress-private-message-for-friends-only/June 26, 2013 at 7:47 am #166901In reply to: Untraceable spam user
mareksgregsParticipantI deleted the user from the database yesterday(in which it didn’t have an email either) yesterday. And it hasn’t come back yet. I think it may be finally gone. 🙂
June 25, 2013 at 11:23 pm #166880In reply to: Untraceable spam user
Jose ContiParticipantThank’s @ubernaut
June 25, 2013 at 3:28 pm #166839In reply to: Untraceable spam user
Ben HansenParticipant@jconti keep up the good work!
June 25, 2013 at 7:43 am #166826In reply to: Untraceable spam user
Jose ContiParticipant@mareksgregs use this plugin:
https://wordpress.org/plugins/wordfence/
That plugin will check all core files.
Do you use WordPress simple or WordPress Multisite?
June 25, 2013 at 7:25 am #166824In reply to: Untraceable spam user
mareksgregsParticipant@jconti What am I supposed to look for in those files?
And I found the user in the users database. Should I delete it?June 25, 2013 at 7:04 am #166822In reply to: Untraceable spam user
Jose ContiParticipantHi @mareksgregs and @ubernaut,
I’m the WangGuard developer.
Search the user in the database (wp_users). You need to find there.
You need to check wp-config.php, index.php, wp-content and if you use a cache, wp-content/cache
I think you have been hacked. Is impossible that a user don’t have and email and if you delete the users and 5 seconds later, the user I’d there again, there are a script that create the user.
And yes, every 2 days, we have a very big attack. Now, we are looking for bigger servers with a best protections agains this attacks 🙁
Kind regards
June 24, 2013 at 5:47 pm #166770In reply to: Untraceable spam user
Ben HansenParticipantjust blank space huh? never seen that before not sure how its even possible unless as i said before your site was hacked and even then I’m still not sure how it’s possible. as far as i know every wordpress user account must be associated with an email address.
June 24, 2013 at 5:42 pm #166769In reply to: Untraceable spam user
mareksgregsParticipantI think I found out why it says Error – 101 too. When I click “Recheck”, it says “The selected user couldn’t be found on users table”.
So does that mean that it’s beyond user database? o_oEdit: There’s still no email.
June 24, 2013 at 5:42 pm #166768In reply to: Untraceable spam user
Ben HansenParticipantwell you are assuming they will continue to use the same ip which is i think not a safe assumption. what is the email listed?
June 24, 2013 at 5:38 pm #166767In reply to: Untraceable spam user
mareksgregsParticipantI just deleted the user again, and it re-appeared 5 seconds later, but this time Wangguard logged an IP! This means progress!
Any suggestions for how to ban the IP now?
June 24, 2013 at 5:21 pm #166766In reply to: Untraceable spam user
Ben HansenParticipanthmm i think i have also seen that before i forget exactly what it was but the address was invalidly constructed as i recall (meaning it was not the proper format you’d expect to see for an email). i have noticed that wangguard’s server(s) are not always available (probably get attacked with some frequency). whenever wangguard is not online the plugin just lets people pass but it is rather odd that someone should even be able to complete registration without a valid email.
:/
June 24, 2013 at 5:11 pm #166763In reply to: Untraceable spam user
mareksgregsParticipant@ubernaut I tried that Wangguard plugin (thanks for introducing it to me by the way, it’s awesome) and when I scanned the user, it’s status came back as “Error – 101”
I don’t see how my site could be hacked though. Perhaps the problem is in one of my plugins. Unlikely though. All of my active plugins are legit and shouldn’t have spam bots in their files…
June 24, 2013 at 4:37 pm #166755In reply to: Untraceable spam user
Ben HansenParticipanti don’t see how that’s possible unless your site was hacked, maybe then, not sure.
June 24, 2013 at 4:33 pm #166753In reply to: Untraceable spam user
mareksgregsParticipant@ubernaut Oh I forgot to mention, there isn’t an email associated with the account either.
I think that something in the files may be creating it over and over again. Would that be possible?June 24, 2013 at 4:17 pm #166751In reply to: Untraceable spam user
Ben HansenParticipantwhen you say “has no registration ip” i’m assuming you are using wangguard or some other plugin to get that info. fact is there must be an ip it may be spoofed but regardless why not just ban whatever email they are using to register?
June 20, 2013 at 12:14 pm #166472Jay CollierParticipantWe are using WP-Better-Emails. Works great. Still have to suggest people check their spam folders.
June 20, 2013 at 2:27 am #166446In reply to: Buddypress Spam BOTS PLEASE HELP
inge12ParticipantLeofitz, WangGuard will check your user base for spammers and delete them.
See https://wordpress.org/plugins/wangguard/
The author says that “WangGuard not only protect your site from sploggers, spam users or unwanted users, WangGuard cleans your database from them. No plugin or service does this, only with WangGuard you will get this feature,” and I believe him. His English may not be too good, but the plugin is really outstanding.
There’s just one consideration for you: In order to have your database cleaned up, you will have to submit far more than 500 queries the first month. Perhaps you can arrange to pay for a month?
Here’s my suggestion to reduce database queries after that. (It worked for me.) Buddypress allows for the customization of User Profiles. Add a couple of questions that require a certain amount of intelligence to answer and make them required. That means the form will not be submitted either to WordPress or to WangGuard if the required fields are not filled out. It’s not fool-proof, but it decreased queries on my very busy site to just a few a day.
Incidentally, I added a question, “How do you plan to participate?” Among the choices offered the user are these:
“I want to increase my online presence.” and
“I want to sell my stuff.”We don’t need anyone not bright enough to figure out that these replies do not make the user desirable. Now all I need is a script to automatically kick out users who choose these replies. 😉 (As it is, they can be manually deleted if other users report them.)
I don’t know what happens to a group when all the users are unsubscribed, so this may not be precisely what you are looking for. But WangGuard will make your site secure against almost all sploggers. (One registrant passed all tests on our site, and we had to delete manually, but that person must have registered manually too.)
Good luck!
Inge (http://ssnet.org)
June 19, 2013 at 4:38 pm #166405In reply to: Buddypress Spam BOTS PLEASE HELP
Ben HansenParticipantmaybe not as long as you think if you use the backend, can’t you mass delete them that way?
June 19, 2013 at 7:34 am #166380In reply to: Buddypress Spam BOTS PLEASE HELP
LeofitzParticipantAre there any current plugin solutions which can delete accumulated BP spam groups? The BP Group Management plugin did this, from what I’ve read, but it gives error messages with the current versions WP 3.5.1 and BP 1.7.2
Any suggestions will be appreciated as I have a couple dozen WP-BP sites and some have 1000-5000 groups that are spam generated. Manually deleting these would take me until 2014!
June 14, 2013 at 8:09 pm #166075rcainParticipant@bp-help
good suggestions. thx. 2 of them r new to me, so other people may find them helpful also.
on our sites we r using::
Keith Graham’s most excellent ‘stop-spammer-registrations-plugin’ – https://wordpress.org/plugins/stop-spammer-registrations-plugin/
– has stopped over 53,000 spammers since feb this year! it uses external lookups on StopForumSpam, ProjectHoneyPot, BotScout, (Akismet, which we dont use), others – thus great collective benefit/advance warning of bad traffic. also traps brute force attacks (bad logins/registrations/comment posts, etc), etc. is simple enough to play nice with most plugins.
to try & keep as much load off the front-end of the server as possible, we also have set up:
linux iptables ( & ufw add on )- as the basis of all firewall stuff. also has our manually maintained blacklists & whitelists. various custom rule chains setup. takes a while to get your head around, but is essential.
linux fail2ban – essentially an add on to iptables, puts people in jail for bad behaviour – eg: brute force attacks against ssh, ftp, mail logins. we also have set up custom rules detecting bad activity against wp-login.php itself via fail2ban. am looking to do some more with this.
linux apache – mod-security2, libapache2-mod-evasive, libapache2-mod-antiloris, libapache2mod-spamhaus – which help protect against general bad behaviour, DDOS, blank header attacks, the infamous ‘Loris’ script (which we’ve experienced!), and bot-nets. still assessing how effective these r.
we have also had to tune apache on our VPS for resilience in the face of DDOS type attacks and heavy-handed brute force attacks.
some further good tips here: http://www.dannytsang.co.uk/index.php/apache-2-hardening-tips/ & elsewhere.
linux logwatch – reports various access stats (the good & the bad & the ugly) via email – very useful indeed for checking whther situation is under control (or not).
linux rkhunter – scans for rootkits on the server from time to time – just be sure – & particularly useful if u ever do get infected in hunting down the intruder’s code.
obviously we also have file system bolted down. (there is a good wp plugin to check permissions bolt-down, i forget what its called). we also spend a LONG time analysing logs etc.
anway, that takes care of many of the bad boys, but we r still left with the following problems to crack:
1) we have observed that many bad bots/scripts are exhibiting ‘learning behaviour’ (ie. heuristic) and r finding ways around fail2ban rules/jails, etc. in particular:
a) rotating IP addresses to match ‘ban counts’ – currently we have them wasting an IP address every 3-4 attempts, but they still seem to have an inexhaustable supply, else are spoofing extreamly well.
b) varying their retry period to match the length of jail sentence. (ie. they are not wasting their mips whilst in jail, just enough to detect when they are released,record it, and tune their future responses).
2) content scrapers, probes and bad-bots generally – these r wasting enormous resource on our servers. typically i would suggest such ‘bad traffic’ is responsible for over 50% of total server load (ie. not good at peak times on a busy site). additional problems we r facing here:
a) bad bots often spoof the agent string to pretend to be eg. google, bing, etc. the only way u can tell is by reverse lookup of ip address and try and match to one of well known range of ‘good bot’ addresses. but, despite fact that many ranges are well known, most of them are never actually published or confirmed, many are variable. i am not aware of any definitve list of ip addresses of good bots (though there is http://www.iplists.com/ whichis not bad, & http://www.webmasterworld.com/search_engine_spiders/ which is often helpful – these are very much ‘best efforts/as seen in the wild’ lists.). this problem worsens with the rise of social network agregation services, other (legitimate) content agregators, and personal content aggregating software on mobiles, tablets, etc.
idea: i am thinking of writing a script/plugin/rule to do smart lookup of ip against good bots list, & to automatically maintain that (collective) list. ideally, this is a service that someone like spamhause, or projecthoneypot should offer, since they already have the infrastructure. but, we’ll see. the script will detect traffic ‘purporting to be a SE bot, of any kind and to ban it via iptables if it isnt in the approved list/doesnt check out. the risk is in false positives and harming ones SEO. anyone any thought in this area?
b) probes & sniffers hunting out wp/bp forms, ajax ports, plugin files, forms, etc – in advance of main attack by penatration/spamming bots. typically always use swiftly rotated ip’s. many many variants out there. usually they have no luck on our sites, but that does not stop them trying in vast numbers (bot-nets, collectives? hives?) and harming out response times, etc.
idea: url obfuscation has been brought up on this forum before, particularly for eg: login, registration, admin url’s, etc. i am thinking of creating a plugin to dynamically hash encode links of choice using someething based on wp forms nonce system. not only useful for causing probes & hackers pain, but also to help thwart media thieves. obviously, scripters will soon respond by just snanning for link titles in html, so not bullet proof in any way, but they will at least be on 1-time request code, so causing them page reload every request & less sophisticted scripts will be totally wasting their own time.
anyway. these have been my thought so far. would love to hear experience/insights of others.
unfortuntely wordpress & buddypress sites in particular represent the richest of prizes for hackers, content scrapers, spammers, etc – & they r really on our case. furthermore, there is some BIG money involved, from porn to pharma to credit card fraud; that means some very smart programmers being paid excellent rates, to hack our systems, full time. add to that, the 10’s of millions of infected machines out there (often unknowingly) operating as botnet drones, trying to pernetrate our servers 24×7, steal our machine resources and steal our members personal data. it is a war of attrition.
all further experience, ideas welcome, here.
June 13, 2013 at 6:54 pm #165969In reply to: Multiple profiles under 1 email address
bp-helpParticipant@tribblehunter
Not sure I understand you correctly so I will offer some advice. Even if having multiple user profiles under one email was possible your site would become spam heaven so I would highly advise against this. Are you sure you don’t mean adding a new field group which is already possible?
https://codex.buddypress.org/user/buddypress-components-and-features/extended-profiles/ -
AuthorSearch Results