Normally I access the kubotabooks.com site from work and print up the free manuals. I have always been a little cautious of this site because it requires a user to download and open a file from an unknown source.
Today I visited the site from home and instantly got a security message from norton that it was an unsafe site
CLicked this link then this one that explains why and was not all to surprised to find out trojans were detected.
If you down load manuals or any thing on line always scan the file with your anti virus before opening.
One never knows were evil lurks!
This is a summary of the trojan listed on norton that was detected:
Name: PHP.RSTBackdoor
Type: Trojan Horse
This threat requires the file r57shell.php to run. This file may already be present or may be manually copied to the compromised computer by the attacker.
When PHP.RSTBackdoor is executed, it performs the following actions:
Creates the following files:
/tmp/bdpl
/tmp/back
/tmp/bd
/tmp/bd.c
/tmp/dp
/tmp/dpc
/tmp/dpc.c
Opens a back door via HTTP access. It allows the remote attacker to perform any of the following actions:
Execute shell commands on /bin/bash
Change file permissions
Delete files and directories
Upload files
Edit files
Find files
Show system information
Dump SQL database
Today I visited the site from home and instantly got a security message from norton that it was an unsafe site
CLicked this link then this one that explains why and was not all to surprised to find out trojans were detected.
If you down load manuals or any thing on line always scan the file with your anti virus before opening.
One never knows were evil lurks!
This is a summary of the trojan listed on norton that was detected:
Name: PHP.RSTBackdoor
Type: Trojan Horse
This threat requires the file r57shell.php to run. This file may already be present or may be manually copied to the compromised computer by the attacker.
When PHP.RSTBackdoor is executed, it performs the following actions:
Creates the following files:
/tmp/bdpl
/tmp/back
/tmp/bd
/tmp/bd.c
/tmp/dp
/tmp/dpc
/tmp/dpc.c
Opens a back door via HTTP access. It allows the remote attacker to perform any of the following actions:
Execute shell commands on /bin/bash
Change file permissions
Delete files and directories
Upload files
Edit files
Find files
Show system information
Dump SQL database
Last edited: