close ad
 
Important WebAssist Announcement
open ad
View Menu

Technical Support Forums

Free, outstanding support from WebAssist and your colleagues

Hackers somehow using mail_php.php

Thread began 9/03/2017 6:21 pm by Steve | Last modified 9/22/2017 10:44 am by Steve | 1445 views | 11 replies

Steve

Hackers somehow using mail_php.php

We all fight Spammers using our forms to send spam as Contact emails.
We use reCaptcha, honeypots and anything else we can think up to thwart the automated spamming of our Customers.

Now I have a spammer sending daily emails which look to come from the mail_php.php file.
How they are doing this is beyond my comprehension.

1st I saw some of my other customer get spams and one noted "testing XRumer" in one of the fields. Cool, I'll research this to see what they can do.
Turns out a lot. XRumer can bypass reCatchas and HoneyPots.

So I decided to change the comment field id from "message" to "34rrSGD" and make the honeypot field "comment".
Next our code says IF comment field has values ignore sending an email and setting the post as a DB record.
Lastly we change the title for column 34rrSGD to Comments in the final email.

There is no longer any field named "message".

BUT we are still getting emails sent to the Customer in the original email format and using the "message" field.

We DO see legitimate Contact Submissions posting to the DB and also swapping out 34rrSGD to Comments.
The "Blank" template being assigned to the email response has been changed. We now hide the hidden consent field ($remove[] = "hdn-consent";)
There is NO message input
and we swap out 34rrSGD with Comments
if ($pkey == "34rrSGD") $pkey = "Comments";

Yet there is an email generated multiple times per day, coming from our server, using the old non-existent template.

I can only think that the Bad Guys somehow also send themselves a copy of the originally formatted email response and are now resending that but with different content each day.

Problem is the mail server logs show it's coming from our server AND the email headers are saying it's coming from mail_php.php
"X-PHP-Originating-Script: 0:mail_php.php"

I've attached a screen shot showing the spoofed email content and the latest legitimate one.

How could this be happening?

Build websites with a little help from your friends

Your friends over here at WebAssist! These Dreamweaver extensions will assist you in building unlimited, custom websites.

Build websites from already-built web applications

These out-of-the-box solutions provide you proven, tested applications that can be up and running now.  Build a store, a gallery, or a web-based email solution.

Want your website pre-built and hosted?

Close Windowclose

Rate your experience or provide feedback on this page

Account or customer service questions?
Please user our contact form.

Need technical support?
Please visit support to ask a question

Content

rating

Layout

rating

Ease of use

rating

security code refresh image

We do not respond to comments submitted from this page directly, but we do read and analyze any feedback and will use it to help make your experience better in the future.

Close Windowclose

We were unable to retrieve the attached file

Close Windowclose

Attach and remove files

add attachmentAdd attachment
Close Windowclose

Enter the URL you would like to link to in your post

Close Windowclose

This is how you use right click RTF editing

Enable right click RTF editing option allows you to add html markup into your tutorial such as images, bulleted lists, files and more...

-- click to close --

Uploading file...