Posts by splitzoul

    So to close the thread I can say that it seems I have solved my issue.


    Initially I tried deleting only the webIF on the infested image and a week passed with no more attacks, but it then started again so it seemed not to have an effect on the outgoing attacks so I believe that there must have been a hidden malware spamming out from it.


    After this I tried installing a clean image on the free dual boot slot and waiting now for several weeks it has seemed to quiet down so I conclude now that this has solved my issue and I have now removed the old image.


    Thanks for all insights and help given along, it has been much appreciated!

    Wierd thing I can't access the box anymore via ftp

    They`ve probably changed the password.

    Menu > Setup > Network > Password > Choose your password > Green (Save)

    Yes, I did that a couple of times but no luck getting access to ftp server, also I am using the password to access telnet so I assume it should be good.


    You should also assume they have been sniffing around on every device that is on your network.


    Take precautions and secure everything.


    I am definitely doing this!

    Offcourse you' re right. Wierd thing I can't access the box anymore via ftp It just gives me an error when connecting, even though it claims the server is running.

    I did manage to delete the folder with telnet so I'll see what happens.

    Thank you so far!

    Ok so I have not succeeded to remove the openwebif , It does not show in the remove plugins interface on the box and when using the telnet commands to remove the plugin it does just answer with

    " No packages removed."

    Any suggestions?

    I have not manually opened any ports in my router for the box, but also I did not do anything to prevent it. Offcourse apart from my Routers IPS AiProtection that I recently activated which, as I mentioned has blocked 300 attempts mostly to bruteforce some various IP´s.


    I have no password protection on the box as I have never known this to be an issue.

    I will try to reflash it and secure it, thanks.

    Hello I have recently been contacted by my ISP about some malicious activity coming from my ip address and I have traced it to my Octagon unit.

    I have installed Open ATV 6.4 build 20220715

    I have also installed oscam through the available plugins interface.


    I have now set up my router to track activity with its internal firewall and so far it has logged over 300 bruteforce attempts to various ip addresses.


    Anyone knows if there is a general malware issue with open atv or what to do with it?

    Thx, still no luck, I get an error message plugin not available: PLi/Softcam setup (No module named PLi.SoftcamSetup.plugin).
    I am sitting on a dm800SEv2 - opendroid 5.5 I need a guide of the correct order of installation of emu and softcam so it will show up in the blue or green panel. on a clean flash.


    Currently I am doing this: Flash OpenDroid 5.5 - FTP CCcam230 + Softcamsupport + mgcamd to folder /tmp - installing all via install local extension. FTP CCcam.cfg to /etc folder - restart enigma
    ccam is not starting up and emu is not showing on plugin panel.


    Funny thing is that plugin panel option "remove plugin" shows the softcam - CCcam230 also I can run CCcam via DCC with no problem!


    Any suggestions?