Due to the high number of threat attacks on Servers, we recommend that you increase the security by installing a RealTIme Upload File scanner in addition to the firewall. A hacker can exploit a compromised user account to upload malicious scripts and inject malicious code into user accounts. RealTIme Upload File scanner will prevent uploads of Shell Scripts and files which contain malicious code and help safeguard your client data. The Upload File Scanner Security Script can also check for existing exploits on the server.
The active scanning of uploaded files can help prevent exploitation of an account by malware by deleting or moving suspicious files to quarantine before they become active. This includes recent exploits such as the Dark Mailer spamming script (multiple variants, including obfuscated code regardless of file name) and files uploaded with the Gumblar Virus, also the recent imgaaa.net defacement scripts. It can also prevent the uploading of PHP and perl shell scripts, commonly used to launch more malicious attacks and for sending spam.
The Upload File Scanner Security Script also allows you to perform on-demand scanning of files, directories and user accounts for suspected exploits, viruses and suspicious resources (files, directories, symlinks, sockets). You can run scans of existing user data to see if exploits have been uploaded in the past or via methods not covered by the active scanning. It has been tuned for performance and scalability. While we cannot guarantee that the measures that we suggest will prevent further exploitation, they should help provide you with more information to help you track down any potential future exploit attempts.
There is a annual fee of Rs. 18400 + GST as applicable for installation, configuration and support for this Service to protect the data of your users.
More Information:
The RealTime file eXploit Scanner is a new tool from us that performs active scanning of files as they are uploaded to the server.
Active scanning can be performed on all text files:
- Actively scans all modified files within user accounts regardless of how they were uploaded (new in v2)
- PHP upload scripts (via a ModSecurity hook)
- Perl upload scripts (via a ModSecurity hook)
- CGI upload scripts (via a ModSecurity hook)
- Any other web script type that utilizes the HTML form ENCTYPE multipart/form-data (via a ModSecurity hook)
Pure-ftpd uploads
The active scanning of files can help prevent exploitation of an account by malware by deleting or moving suspicious files to quarantine before they become active. It can also prevent the uploading of PHP and perl shell scripts, commonly used to launch more malicious attacks and for sending spam.
The RealTime file eXploit Scanner also allows you to perform on-demand scanning of files, directories and user accounts for suspected exploits, viruses and suspicious resources (files, directories, symlinks, sockets). You can run scans of existing user data to see if exploits have been uploaded in the past or via methods not covered by the active scanning. It has been tuned for performance and scalability.
Exploit detection includes:
- Over 6000 known exploit script fingerprint matches (in addition to standard ClamAV detection)
- Known viruses via ClamAV
- Regular expression pattern matching to help identify known/unknown exploits
- Filename matching
- Suspicious file names
- Suspicious file types
- Binary exeuctables
- Some illegal web software installations
- Custom user specified regular expression patterns
- Reporting of symlink attacks
- Comprehensive constant scanning of all user data using the cxs Watch daemon - scans all user files as soon as they are modified
- Daily check for new Exploit Fingerprints
- Check for old version of popular web scripts (e.g. Wordpress, Joomla, osCommerce)