I have a file called q.php that has appeared in all my websites hosted in the same server. Does anyone know what the file does?
I noticed this when I got an email from incident@cert-in.org.in.
The email says:
Dear Sir/Madam,
CERT-In is tracking defacement of Indian websites on regular basis.
We have found that the website "example.com" hosted on IP xxx.xxx.xxx.xxx has been defaced on 30.09.2016 by the hacker group "Aris Dot ID".
The URL of the defaced website is:
example.com//q.php
Content of q.php file: http://pastebin.com/raw/TwEYz6KT
I deleted the file from all my websites. But I am not sure what extra security should I implement for this.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
It seems that you’ve been hacked. But lucky you, it was not a “bad” hacker, he just added a file as a proof that he was there. You should check your firewall, change your ssh password, disable ftp if you don’t need it, look at any server side scripts if there is updates, and updates any softwares that you are using.
Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.
Full documentation for every DigitalOcean product.
The Wave has everything you need to know about building a business, from raising funding to marketing your product.
Stay up to date by signing up for DigitalOcean’s Infrastructure as a Newsletter.
New accounts only. By submitting your email you agree to our Privacy Policy
Scale up as you grow — whether you're running one virtual machine or ten thousand.
Sign up and get $200 in credit for your first 60 days with DigitalOcean.*
*This promotional offer applies to new accounts only.