Benjamin Hosack
2 min read

This last week we have assisted a number of online clients having been compromised via the “Filesman” backdoor. This backdoor is not a new attack – in fact, it’s been very well publicized and documented over the last few years.

Who does it affect?

Filesman can affect any PHP site – that includes, Magento, WordPress, Drupal, Joomla, osCommerce etc. Usually it affects older versions of the website frameworks.

What does Filesman do?

It allows an attacker to easily access your site, make modifications and plant additional malware infections/backdoors elsewhere on your website.

The compromised websites that we have been working with have all had their customer data stolen – including transaction data (credit and debit card details), which means that their clients are likely to see fraud on their credit/debit cards imminently.

How to identify this malware on your website

There are a great deal of examples available on many security websites - the file names may vary slightly, however this is what we have found this week:

$auth_pass = "";

$color = "#df5";

$default_action = "FilesMan";

$default_charset = "Windows-1251";

Slight variants of the content have been seen but the spelling of "FilesMan" within the first few lines of the malware clearly identify this threat.

What to do if you identify Filesman on your site:

You have a few options:

1. The do-it-yourself route

a. Remove the malware – delete it.

b. Run a scan of your website using FGX-Web Alert (its free for 30 days) to identify whether you have any other known malware.

c. Update your website framework/CMS/plugins/extensions.

d. Remove inactive files/plugins/extensions.

e. Change your passwords (have a read of our Password blog post if you want some help developing a strong password).

f. Put up a Web Application Firewall – we offer this protection through FGX-Web Protect.

2. We can assist you:

a. Get in touch with our support team.

b. They will help you to get FGX-Web onto your website, remove the malware and check for other backdoors.

How to prevent being infected by this type of attack

Backdoors are usually uploaded once a vulnerability in the website has been exploited – this means that once the backdoor is on your site, your business has been hacked and compromised.

  • If you are using any of the frameworks mentioned above (Magento, WordPress, Drupal, osCommerce, Joomla) then make sure you are using the latest version.
  • Remove any inactive files/plugins/extensions.
  • If you can’t update to the latest version, we would recommend using FGX-Web Protect to provide the web application firewalling and security monitoring of your website.
  • Passwords – change your passwords and ensure that you are using strong passwords – not your mother’s maiden name!

Subscribe to our Blog

Contact Us

Access cybersecurity advisory services

 

Benjamin Hosack
Benjamin Hosack

Benj Hosack is a Director and co-Founder of Foregenix Limited. Foregenix is a specialist information security business delivering services in Forensics, PCI DSS, PCI P2PE, PA-DSS and information security solutions within the Payment Card Industry. Our technologies are designed to simplify security and PCI Compliance. Specialties: Cardholder Data Discovery - defining and reducing PCI DSS Scope / PA-DSS / PCI DSS / P2PE / Account Data Compromise Investigations. We are specialists in the Payment Card Industry and work with all types of companies in the payment chain (Acquiring banks, Processors, hosting providers, web designers, merchants, systems integrators etc).

See All Articles
SUBSCRIBE

Subscribe to our blog

Security never stops. Get the most up-to-date information by subscribing to the Foregenix blog.