Solved

Magento styles.css file changed ? Compromised ?

Posted on 2013-06-02
3
254 Views
Last Modified: 2016-03-02
Hi Experts,

I got a complain that the Magento css has changed, and please check below what I have seen from the changed file. It's seems like we didn't had a release on anything planned for March 3rd. Or we are not sure some has did change using the Magento admin panel.

-rw-rw-r-- 1 1000 www-data 108090 2013-03-03 10:04 styles.css

I'm not sure who is 1000 ?

Can you please help me to investigate about this.

Thanks a lot for your time !
0
Comment
Question by:Shakthi777
  • 2
3 Comments
 
LVL 61

Assisted Solution

by:btan
btan earned 500 total points
ID: 39217765
I assume you also know this for ls command
2nd column is --> Number of links
3rd Column is --> File/directory owner
4th Column is --> File/directory group

Quick check is also etc user on such '1000' user, and check on system trails and symptoms available for breaches and login at pt of changes or creation of file

See this to help in check
http://wiki.metawerx.net/wiki/LBSA
0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 39217771
Likewise this has more info on checking the file permission abuses if any ...see the file Files and File system Security section. Likwise another useful sheet is the second link

http://www.ibiblio.org/pub/linux/docs/howto/other-formats/html_single/Security-HOWTO.html

http://www.sans.org/score/checklists/ID_Linux.pdf
This sheet is split into these sections:
• Unusual Processes and Services
• Unusual Files
• Unusual Network Usage
• Unusual Scheduled Tasks
• Unusual Accounts
• Unusual Log Entries
• Other Unusual Items
• Additional Supporting Tools
0
 

Author Closing Comment

by:Shakthi777
ID: 39297475
tnx !
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Read about achieving the basic levels of HRIS security in the workplace.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now