Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

How To Revovery from IFrame Injection Attack

Posted on March 5, 2012

Seeing that a lot of websites are plagued with Iframe Injection vulnerabilities, independent security researcher Shadab Siddiqui made up an advisory to help website administrators recover their websites after such a security hole has been exploited. He also listed some safety measures that must be implemented in order to avoid such incidents.

The first step in recovering a website after an Iframe Injection attack is to shut it down completely during the cleansing process. This must be done to ensure that the malicious elements that may have been injected are not spread to the computers of unsuspecting visitors.

According to Siddiqui, the next step is to change all the passwords.

“Although this may seem like a simple step, many people, including myself, often fail to change all the passwords immediately after an attack has been discovered,” he told us.

“You need to change all the passwords associated with the website; which include FTP passwords, SSH passwords, account passwords, database passwords, admin passwords and so on.”

Further on, administrators should make a copy of the damaged website on which they can perform further analysis.

While it’s not recommended to keep the infected files on the server, they might come in handy later in case it may be necessary to refer to the injection source code, which is why a compressed copy should be stored in quarantine.

The fourth step is a highly important one since it refers to the backup process that admins need to perform periodically to make sure that they always have a clean copy of the website.

“Do not rely on your hosting provider for a backup copy of your site. Many hosting providers say they do an automatic backup every night, however, it is more reliable if you have other backup solutions for your website,” he explained.

“Scan your backup copy with Anti-Virus software like ZoneAlarm or Trend Micro before uploading to the web server to ensure that the backup copy is free from viruses and Trojan horses.”

After the site has been restored from a clean backup copy, it must be checked. If all tests are passed, it can be reopened to the public.

“In order to ensure that the same attack does not happen again, you will need to do a full analysis of the attack and its origin. Was it because of a security hole in your application? Was it caused by a weak file permission?”

“Or is your server affected with some virus that injects this code into your website at regular intervals? You will need to understand how it happens in order to prevent it in the future. And when necessary, obtain an expert advice,” Siddiqui added.

The expert believes that the final step is implementing security measures based on the analysis of the attack. New security restrictions, upgrading all the applications that power the site, securing the web servers, these are all measures that can prevent future attacks.

In the end, let’s hear some basic advice on what must be done to secure a site against Iframe Injection attacks:

I have encountered and recovered quite a few websites that had been attacked by malicious iframe exploits in recent years and the common causes seem to be as follows:

– The website is hosted on a cheap web hosting service;
– The website is using an old version of an open source application (eg: WordPress ) which has known security issues;
– File permissions on the server are not set accordingly (eg: every file and folder on the server is set to 777 read-write-execute);
– Weakness in an application code. For example, there is not sufficient input validation;
– FTP rather than SFTP is used;
– There is no IP restriction for SSH and FTP accounts.

via Softpedia

Terbaru

  • Inilah Alasan Raja Ampat Disebut Surga Terakhir di Bumi dengan Biodiversitas Laut Paling Gokil di Dunia
  • Inilah Tanggapan PKB Soal KPK Usul Syarat Capres Harus Kader Partai
  • Inilah 5 Calon Ketua DPC PKB Timor Tengah Selatan dan Perubahan Aturan Seleksi yang Perlu Kalian Perhatikan
  • Inilah 51 Kode Redeem FF Terbaru 29 April 2026, Ada Gintoki Bundle dan Skin Eksklusif!
  • Inilah Profil Abdul Kadir Karding, Politikus PKB yang Resmi Dilantik Menjadi Kepala Badan Karantina Nasional!
  • Inilah 36 Kode Redeem FC Mobile Terbaru Mei 2026, Ada Trik Rahasia Dapetin Pemain OVR 119 di Event TOTS!
  • Inilah iPhone Ultra, Bocoran Ponsel Lipat Pertama Apple dan MacBook Ultra Layar Sentuh yang Siap Mengguncang Pasar!
  • Inilah Bocoran Tanggal Rilis dan Gameplay EA Sports UFC 6 yang Paling Dinantikan
  • Inilah Arti Move WA dalam Bahasa Gaul yang Sering Muncul di Aplikasi Kencan dan Media Sosial
  • Inilah realme C100, Smartphone dengan Baterai Titan 8000mAh Pertama yang Garansi Awet Sampai 7 Tahun!
  • Inilah Cara Mengatasi Third Party Software Is Interfering With Roblox yang Sering Muncul Tiba-Tiba
  • Inilah Penyebab Data Seluler Tidak Bisa Digunakan Padahal Sudah Aktif dan Solusi Praktis Mengatasinya
  • Inilah Kenapa Canva Error 503 Tidak Bisa Dibuka Hari Ini dan Cara Mengatasinya Sampai Layanan Kembali Normal
  • Inilah Cerita Hangat di Balik Muscab PKB Kebumen: Dari Urusan Dapur Hingga Strategi Pemenangan 2029!
  • Inilah Kronologi dan Identitas 4 WNI yang Disandera Perompak Somalia di Kapal MT Honour 25
  • Inilah Alasan PKB Kaji Ulang Ambang Batas DPRD Biar Sejalan Sama Putusan MK
  • Inilah Jadwal Pengumuman Hasil TKA SD dan SMP 2026 dan Cara Cek Skor Kalian Secara Online
  • Inilah HP Gaming Vivo Terbaik 2026 yang Paling Gahar, Main Game Berat Nggak Pake Ngelag!
  • Inilah Potensi Pajak Selat Malaka yang Bikin Rame, Ternyata Gini Cara Mainnya Biar Nggak Melanggar Hukum Internasional
  • Inilah Alasan Kenapa Sinkhole Sering Muncul di Indonesia dan Cara Mengenali Tanda-Tandanya Supaya Kalian Tetap Aman
  • Inilah Program PJJ 2026 untuk Anak Tidak Sekolah, Cara Mudah Masuk SMA Tanpa Harus ke Kelas Tiap Hari!
  • Inilah Program SPMB 2026 PJJ Khusus Anak Tidak Sekolah, Solusi Buat yang Pengen Balik Belajar!
  • Inilah Cara Kuliah di Al-Azhar Mesir Lewat Jalur Kemenag 2026, Lengkap dengan Syarat dan Jadwalnya!
  • Inilah Jadwal Lengkap Jalur Mandiri Unud 2026, Persiapkan Diri Kalian Sebelum Menyesal!
  • Inilah 8 Universitas Swasta Terbaik di Indonesia Versi THE Asia University Rankings 2026 yang Bisa Jadi Pilihan Kuliah Kamu
  • Inilah Jadwal Terbaru SSU ITB 2026 yang Diperpanjang, Lengkap dengan Syarat dan Rincian Biayanya!
  • Inilah 10 Jurusan Kuliah Paling Dicari Perusahaan Tahun 2026, Cek Daftarnya Biar Nggak Salah Pilih!
  • Inilah Cara Daftar Beasiswa Tut Wuri Handayani 2026, Kesempatan Emas Buat PNS Kemendiktisaintek Tingkatkan Karier!
  • Inilah Ketentuan Lengkap TKA Susulan 2026 SD dan SMP, Cek Syarat dan Jadwal Resminya Di Sini!
  • Inilah Kurikulum Berbasis Cinta Madrasah: Panduan Lengkap dan Link Download PDF Terbaru 2026
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Transform Your Windows 11 Interface into a Sleek and Modern Aesthetic Masterpiece
  • How to Understand Google’s New TPU 8 Series for Massive AI Training and Inference
  • How to Level Up Your PC Gaming Experience with the New Valve Steam Controller and Its Advanced Features
  • Is it Time to Replace Nano? Discover Fresh, the Terminal Text Editor You Actually Want to Use
  • How to Create Professional Movies and Advertisements Automatically Using the 50 Plus Artificial Intelligence Models in Studio by Abacus AI
  • How to use ChatGPT Images 2.0 to transform your creative ideas into professional visual assets
  • How to Use Dreamina SeaDance 2.0 to Create Professional Motion Graphics and Viral Videos Like a Pro
  • How to Automate Your Daily Digital Chores Using the Powerful Combination of Claude Co-work and Ollama
  • How to access over 500 AI models and build professional automation workflows using WaveSpeed Desktop for free
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme