There is a trojan around infecting sites with a encrypted script starting ‚var zaee=“4.5*2,4.5*‘ and iframe src linking to zxstats com and bali-planet com

This script is to find right after the body tag of index.html files and infects the PC of a visitor by loading an .exe file.
This file in return seems to scan infected PCs for ftp login user and passwords.
Finding these for example in filezilla’s passwordmanager in C:\Users\username\AppData\Roaming\FileZilla\sitemanager.xml it will send these ftp usernames and passwords out and try to access the sites stored in this file.

These sites will get this script injected via ftp to infect more visitors or even your machine again. (suspicious sites I check with chrome having javascript disabled)

There will be all index, start, home and main files with extension .php or .html infected by an added script.

The problem is the stolen ftp login, not any blog software or CMS running there! Giving ftp passwords out of hand no website software can prevent from changing files!

Sites running on php might not work after infection and show an error instead, like „Parse error: syntax error, unexpected ‚?‘ in /xxx/yyy/public_html/index.php on line 18“ (WordPress) or „Parse error: syntax error, unexpected ‚?‘ in /xxx/yyy/public_html/modules/boonex/chat/home.php on line 38“ (Boonex Dolphin)

Actually lucky for visitors as in this case the script doesn’t run and will not infect their machines. In .php files the script is added after the last ‚?‘ and before the closing ‚>‘ and doesn’t work here.

What to do?
First clean your PC from trojans using any anti virus software (malwarebytes, MS Essentials)
Do not store login passwords in Filezilla Servermanager, if you have it there delete it and set it for ‚Ask for Password‘ to manually typing it.
Change your infected servers ftp password (and do not store in the ftp program!!)

With your new login go to your site and ‚repair‘ all infected files by replacing them with a backup file or editing and removing the malicious code – that’s the biggest task ..

Accidents may happen at any time with anyone, so if your website has been hacked by the hackers and they have injected their malicious code in iframe, stay calm and take some serious action to Currently, the hacked systems seem to be abused mainly for small HTML Inline Frames" (iFrames) that are hidden inside the affected websites source code. Now, when I - the unsuspecting end users - surf to This blog post examines Frame Injection attacks. It describes the history of the invention and development of frames, what Frame Injection attacks and hijacks mean for security, and what you can do to prevent them. Hax<iframe src='://.newgrounds - TranslationParty Hax This web seriously needs to learn how to use _tags(); Tags: haxiframe, srchttp, newgrounds, translationparty, Many s were hacked this way, including Twitter, Facebook, Paypal and other s. They have all been fixed, of course. The idea. The idea is very simple. Here’s how clickjacking was done with Facebook: A Powerful, but easy to misuse. Back in the bad old days of web design, there were a lot of elements hanging around, ruining everyone’s day. They were almost always a bad approach to design. Thankfully,