Re: Warning: Iframe based attacks using stolen FTP access info
I have been communicating with Xcart's Help Desk about this and they keep shifting the blame to us. Except my PC scanned clean using Spybot S&D immediately after Emerson cleaned up my server files. I also followed through and checked the C disk and only found our local IP address. To satisfy Xcart I downloaded AVG this morning and ran a full scan which again tested negative. So it was only the server files that were infected and that matches this theory.
Xcart did upgrade work for us that stretched literally into weeks from the time they were given our C panel password until the work was completed. I accept responsibility for failing to change the password but it took so long that I simply forgot. Has anyone had this issue that has not had Xcart do work for them?
__________________
www.sandyscloset.net/home.php/Gold
xcart gold - 4.1.10
X-AOM, DSEFU, X-cart Site map, Firetank's Featured Product Manager and Feedmanager Bundle, BCSEnginneering Product Meta Tags Plus, Category Meta Title Control, Static Page Meta Tag Control, and Variant Modifier,
Hosting by EWD Hosting
|