Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Protect site from penetrations / injections into server / cPanel

Home Forums Security General Security Protect site from penetrations / injections into server / cPanel

Viewing 1 post (of 1 total)
  • Author
    Posts

  • ranger
    Member
    #167635

    A hacker penetrated my cPanel and modified files and code on my site.

    I have a log report from hosting service provider. It goes like this:

    …..frontend/paper_lantern/filemanager/upload-ajax.html?file=megla.txt&fileop=&dir=%2Fhome%2Fmyaccount%2Fmydomain.com&dirop=&charset=&file_charset=&baseurl=&basedir=” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.59 Safari/537.36” “s” “-” 2083

    (I replaced only the account name and site name with generic ones)

    My cPanel password is very strong (100%), it’s long and beside letters and numbers it contains special many characters; I’ve changed it a few times. It is not possible that one can hack it easily.

    It already happened 3 times and each time the system suspends my account automatically for a number of hours, before it’s restored by the support staff.

    I suspect that the attack is done by a former developer who I know was a hacker and we didn’t part on exactly friendly terms. He knows the structure of my site and I have a static IP which he also knows.

    If possible, I would like to know some details about how to protect my site from further similar hacking, penetrations, injections, etc.

    Thanks.

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: