Skip to:
Content
Pages
Categories
Search
Top
Bottom

Search Results for 'spam'

Viewing 25 results - 826 through 850 (of 2,711 total)
  • Author
    Search Results
  • #166960

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    its still a bad sign that base 64 stuff is usually a sign of a open door that has been used to hack your site.

    #166959

    In reply to: Untraceable spam user

    mareksgregs
    Participant

    The scan found only one problem, which is:

    This file may contain malicious executable code
    Filename: wp-content/plugins/user-meta/framework/init.php
    File type: Not a core, theme or plugin file.
    Issue first detected: 45 secs ago.
    Severity: Critical
    Status New
    This file is a PHP executable file and contains an eval() function and base64() decoding function on the same line. This is a common technique used by hackers to hide and execute code. If you know about this file you can choose to ignore it to exclude it from future scans.

    I wasn’t using that plugin though. It was deactivated.

    #166942

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    i think you should really check your site using that wordfence plugin as we both indicated having a user without an associated email is very suspicious.

    #166905
    Henry
    Member

    Have you tried searching the WordPress plugin repository for something like ‘buddypress spam messages’?

    A good plugin that will certainly resolve the issue is
    https://wordpress.org/plugins/buddypress-private-message-for-friends-only/

    #166901

    In reply to: Untraceable spam user

    mareksgregs
    Participant

    I deleted the user from the database yesterday(in which it didn’t have an email either) yesterday. And it hasn’t come back yet. I think it may be finally gone. 🙂

    #166880

    In reply to: Untraceable spam user

    Jose Conti
    Participant

    Thank’s @ubernaut

    #166839

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    @jconti keep up the good work!

    #166826

    In reply to: Untraceable spam user

    Jose Conti
    Participant

    @mareksgregs use this plugin:

    https://wordpress.org/plugins/wordfence/

    That plugin will check all core files.

    Do you use WordPress simple or WordPress Multisite?

    #166824

    In reply to: Untraceable spam user

    mareksgregs
    Participant

    @jconti What am I supposed to look for in those files?
    And I found the user in the users database. Should I delete it?

    #166822

    In reply to: Untraceable spam user

    Jose Conti
    Participant

    Hi @mareksgregs and @ubernaut,

    I’m the WangGuard developer.

    Search the user in the database (wp_users). You need to find there.

    You need to check wp-config.php, index.php, wp-content and if you use a cache, wp-content/cache

    I think you have been hacked. Is impossible that a user don’t have and email and if you delete the users and 5 seconds later, the user I’d there again, there are a script that create the user.

    And yes, every 2 days, we have a very big attack. Now, we are looking for bigger servers with a best protections agains this attacks 🙁

    Kind regards

    #166770

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    just blank space huh? never seen that before not sure how its even possible unless as i said before your site was hacked and even then I’m still not sure how it’s possible. as far as i know every wordpress user account must be associated with an email address.

    #166769

    In reply to: Untraceable spam user

    mareksgregs
    Participant

    I think I found out why it says Error – 101 too. When I click “Recheck”, it says “The selected user couldn’t be found on users table”.
    So does that mean that it’s beyond user database? o_o

    Edit: There’s still no email.

    #166768

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    well you are assuming they will continue to use the same ip which is i think not a safe assumption. what is the email listed?

    #166767

    In reply to: Untraceable spam user

    mareksgregs
    Participant

    I just deleted the user again, and it re-appeared 5 seconds later, but this time Wangguard logged an IP! This means progress!

    Any suggestions for how to ban the IP now?

    #166766

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    hmm i think i have also seen that before i forget exactly what it was but the address was invalidly constructed as i recall (meaning it was not the proper format you’d expect to see for an email). i have noticed that wangguard’s server(s) are not always available (probably get attacked with some frequency). whenever wangguard is not online the plugin just lets people pass but it is rather odd that someone should even be able to complete registration without a valid email.

    :/

    #166763

    In reply to: Untraceable spam user

    mareksgregs
    Participant

    @ubernaut I tried that Wangguard plugin (thanks for introducing it to me by the way, it’s awesome) and when I scanned the user, it’s status came back as “Error – 101”

    I don’t see how my site could be hacked though. Perhaps the problem is in one of my plugins. Unlikely though. All of my active plugins are legit and shouldn’t have spam bots in their files…

    #166755

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    i don’t see how that’s possible unless your site was hacked, maybe then, not sure.

    #166753

    In reply to: Untraceable spam user

    mareksgregs
    Participant

    @ubernaut Oh I forgot to mention, there isn’t an email associated with the account either.
    I think that something in the files may be creating it over and over again. Would that be possible?

    #166751

    In reply to: Untraceable spam user

    Ben Hansen
    Participant

    when you say “has no registration ip” i’m assuming you are using wangguard or some other plugin to get that info. fact is there must be an ip it may be spoofed but regardless why not just ban whatever email they are using to register?

    Jay Collier
    Participant

    We are using WP-Better-Emails. Works great. Still have to suggest people check their spam folders.

    #166446
    inge12
    Participant

    Leofitz, WangGuard will check your user base for spammers and delete them.

    See https://wordpress.org/plugins/wangguard/

    The author says that “WangGuard not only protect your site from sploggers, spam users or unwanted users, WangGuard cleans your database from them. No plugin or service does this, only with WangGuard you will get this feature,” and I believe him. His English may not be too good, but the plugin is really outstanding.

    There’s just one consideration for you: In order to have your database cleaned up, you will have to submit far more than 500 queries the first month. Perhaps you can arrange to pay for a month?

    Here’s my suggestion to reduce database queries after that. (It worked for me.) Buddypress allows for the customization of User Profiles. Add a couple of questions that require a certain amount of intelligence to answer and make them required. That means the form will not be submitted either to WordPress or to WangGuard if the required fields are not filled out. It’s not fool-proof, but it decreased queries on my very busy site to just a few a day.

    Incidentally, I added a question, “How do you plan to participate?” Among the choices offered the user are these:
    “I want to increase my online presence.” and
    “I want to sell my stuff.”

    We don’t need anyone not bright enough to figure out that these replies do not make the user desirable. Now all I need is a script to automatically kick out users who choose these replies. 😉 (As it is, they can be manually deleted if other users report them.)

    I don’t know what happens to a group when all the users are unsubscribed, so this may not be precisely what you are looking for. But WangGuard will make your site secure against almost all sploggers. (One registrant passed all tests on our site, and we had to delete manually, but that person must have registered manually too.)

    Good luck!

    Inge (http://ssnet.org)

    #166405
    Ben Hansen
    Participant

    maybe not as long as you think if you use the backend, can’t you mass delete them that way?

    #166380
    Leofitz
    Participant

    Are there any current plugin solutions which can delete accumulated BP spam groups? The BP Group Management plugin did this, from what I’ve read, but it gives error messages with the current versions WP 3.5.1 and BP 1.7.2

    Any suggestions will be appreciated as I have a couple dozen WP-BP sites and some have 1000-5000 groups that are spam generated. Manually deleting these would take me until 2014!

    rcain
    Participant

    @bp-help

    good suggestions. thx. 2 of them r new to me, so other people may find them helpful also.

    on our sites we r using::

    Keith Graham’s most excellent ‘stop-spammer-registrations-plugin’ – https://wordpress.org/plugins/stop-spammer-registrations-plugin/

    – has stopped over 53,000 spammers since feb this year! it uses external lookups on StopForumSpam, ProjectHoneyPot, BotScout, (Akismet, which we dont use), others – thus great collective benefit/advance warning of bad traffic. also traps brute force attacks (bad logins/registrations/comment posts, etc), etc. is simple enough to play nice with most plugins.

    to try & keep as much load off the front-end of the server as possible, we also have set up:

    linux iptables ( & ufw add on )- as the basis of all firewall stuff. also has our manually maintained blacklists & whitelists. various custom rule chains setup. takes a while to get your head around, but is essential.

    linux fail2ban – essentially an add on to iptables, puts people in jail for bad behaviour – eg: brute force attacks against ssh, ftp, mail logins. we also have set up custom rules detecting bad activity against wp-login.php itself via fail2ban. am looking to do some more with this.

    linux apache – mod-security2, libapache2-mod-evasive, libapache2-mod-antiloris, libapache2mod-spamhaus – which help protect against general bad behaviour, DDOS, blank header attacks, the infamous ‘Loris’ script (which we’ve experienced!), and bot-nets. still assessing how effective these r.

    we have also had to tune apache on our VPS for resilience in the face of DDOS type attacks and heavy-handed brute force attacks.

    some further good tips here: http://www.dannytsang.co.uk/index.php/apache-2-hardening-tips/ & elsewhere.

    linux logwatch – reports various access stats (the good & the bad & the ugly) via email – very useful indeed for checking whther situation is under control (or not).

    linux rkhunter – scans for rootkits on the server from time to time – just be sure – & particularly useful if u ever do get infected in hunting down the intruder’s code.

    obviously we also have file system bolted down. (there is a good wp plugin to check permissions bolt-down, i forget what its called). we also spend a LONG time analysing logs etc.

    anway, that takes care of many of the bad boys, but we r still left with the following problems to crack:

    1) we have observed that many bad bots/scripts are exhibiting ‘learning behaviour’ (ie. heuristic) and r finding ways around fail2ban rules/jails, etc. in particular:

    a) rotating IP addresses to match ‘ban counts’ – currently we have them wasting an IP address every 3-4 attempts, but they still seem to have an inexhaustable supply, else are spoofing extreamly well.

    b) varying their retry period to match the length of jail sentence. (ie. they are not wasting their mips whilst in jail, just enough to detect when they are released,record it, and tune their future responses).

    2) content scrapers, probes and bad-bots generally – these r wasting enormous resource on our servers. typically i would suggest such ‘bad traffic’ is responsible for over 50% of total server load (ie. not good at peak times on a busy site). additional problems we r facing here:

    a) bad bots often spoof the agent string to pretend to be eg. google, bing, etc. the only way u can tell is by reverse lookup of ip address and try and match to one of well known range of ‘good bot’ addresses. but, despite fact that many ranges are well known, most of them are never actually published or confirmed, many are variable. i am not aware of any definitve list of ip addresses of good bots (though there is http://www.iplists.com/ whichis not bad, & http://www.webmasterworld.com/search_engine_spiders/ which is often helpful – these are very much ‘best efforts/as seen in the wild’ lists.). this problem worsens with the rise of social network agregation services, other (legitimate) content agregators, and personal content aggregating software on mobiles, tablets, etc.

    idea: i am thinking of writing a script/plugin/rule to do smart lookup of ip against good bots list, & to automatically maintain that (collective) list. ideally, this is a service that someone like spamhause, or projecthoneypot should offer, since they already have the infrastructure. but, we’ll see. the script will detect traffic ‘purporting to be a SE bot, of any kind and to ban it via iptables if it isnt in the approved list/doesnt check out. the risk is in false positives and harming ones SEO. anyone any thought in this area?

    b) probes & sniffers hunting out wp/bp forms, ajax ports, plugin files, forms, etc – in advance of main attack by penatration/spamming bots. typically always use swiftly rotated ip’s. many many variants out there. usually they have no luck on our sites, but that does not stop them trying in vast numbers (bot-nets, collectives? hives?) and harming out response times, etc.

    idea: url obfuscation has been brought up on this forum before, particularly for eg: login, registration, admin url’s, etc. i am thinking of creating a plugin to dynamically hash encode links of choice using someething based on wp forms nonce system. not only useful for causing probes & hackers pain, but also to help thwart media thieves. obviously, scripters will soon respond by just snanning for link titles in html, so not bullet proof in any way, but they will at least be on 1-time request code, so causing them page reload every request & less sophisticted scripts will be totally wasting their own time.

    anyway. these have been my thought so far. would love to hear experience/insights of others.

    unfortuntely wordpress & buddypress sites in particular represent the richest of prizes for hackers, content scrapers, spammers, etc – & they r really on our case. furthermore, there is some BIG money involved, from porn to pharma to credit card fraud; that means some very smart programmers being paid excellent rates, to hack our systems, full time. add to that, the 10’s of millions of infected machines out there (often unknowingly) operating as botnet drones, trying to pernetrate our servers 24×7, steal our machine resources and steal our members personal data. it is a war of attrition.

    all further experience, ideas welcome, here.

    #165969
    bp-help
    Participant

    @tribblehunter
    Not sure I understand you correctly so I will offer some advice. Even if having multiple user profiles under one email was possible your site would become spam heaven so I would highly advise against this. Are you sure you don’t mean adding a new field group which is already possible?
    https://codex.buddypress.org/user/buddypress-components-and-features/extended-profiles/

Viewing 25 results - 826 through 850 (of 2,711 total)
Skip to toolbar