Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Magento styles.css file changed ? Compromised ?

Posted on 2013-06-02
3
Medium Priority
?
305 Views
Last Modified: 2016-03-02
Hi Experts,

I got a complain that the Magento css has changed, and please check below what I have seen from the changed file. It's seems like we didn't had a release on anything planned for March 3rd. Or we are not sure some has did change using the Magento admin panel.

-rw-rw-r-- 1 1000 www-data 108090 2013-03-03 10:04 styles.css

I'm not sure who is 1000 ?

Can you please help me to investigate about this.

Thanks a lot for your time !
0
Comment
Question by:Shakthi777
  • 2
3 Comments
 
LVL 65

Assisted Solution

by:btan
btan earned 2000 total points
ID: 39217765
I assume you also know this for ls command
2nd column is --> Number of links
3rd Column is --> File/directory owner
4th Column is --> File/directory group

Quick check is also etc user on such '1000' user, and check on system trails and symptoms available for breaches and login at pt of changes or creation of file

See this to help in check
http://wiki.metawerx.net/wiki/LBSA
0
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 39217771
Likewise this has more info on checking the file permission abuses if any ...see the file Files and File system Security section. Likwise another useful sheet is the second link

http://www.ibiblio.org/pub/linux/docs/howto/other-formats/html_single/Security-HOWTO.html

http://www.sans.org/score/checklists/ID_Linux.pdf
This sheet is split into these sections:
• Unusual Processes and Services
• Unusual Files
• Unusual Network Usage
• Unusual Scheduled Tasks
• Unusual Accounts
• Unusual Log Entries
• Other Unusual Items
• Additional Supporting Tools
0
 

Author Closing Comment

by:Shakthi777
ID: 39297475
tnx !
0

Featured Post

Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
In this article, we’ll look at how to deploy ProxySQL.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question