We are happy to announce that Vesta is back under active development as of 25 February 2024. We are working on v1 candidate and expect to engage more with the community over the coming months. We are committed to open source, and we encourage contributors to help us build the future of Vesta.
Search found 90 matches
- Sun Apr 08, 2018 6:57 am
- Forum: General Discussion
- Topic: No space left on device (28)
- Replies: 2
- Views: 4083
Re: No space left on device (28)
run this command you'll see inode is full
Code: Select all
df -i
- Sun Apr 08, 2018 5:09 am
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 709664
Re: Got 10 VestaCP servers exploited
same here 2 servers are suspended because off ddos. Can't send to vesta team as the servers are in suspend mode
thank god i've backups configured on remote server else you know.
thank god i've backups configured on remote server else you know.
- Sat Apr 07, 2018 9:43 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 709664
Re: Got 10 VestaCP servers exploited
Can't delete virus body, after delete it always restored /usr/lib/libudev.so [root@waterleafshop aparser]# clamscan -ri --remove=yes /usr LibClamAV Warning: ************************************************** LibClamAV Warning: *** The virus database is older than 7 days! *** LibClamAV Warning: *** ...
- Sat Apr 07, 2018 8:41 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 709664
Re: Got 10 VestaCP servers exploited
Just to think: when logging in through the web interface to Vesta, a session file should be created, right? And all of them located in /usr/local/vesta/data/sessions As I understand the web interface internals, PHP will check that we have "user" variable inside the session (https://github.com/sergh...
- Sat Apr 07, 2018 8:24 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 709664
Re: Got 10 VestaCP servers exploited
this time exploit is severe resulting outbound ddos attack. And 99% of hosts doesn't allow it on there network
- Sat Apr 07, 2018 8:20 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 709664
Re: Got 10 VestaCP servers exploited
or :
Code: Select all
service vesta stop
- Sat Apr 07, 2018 8:17 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 709664
Re: Got 10 VestaCP servers exploited
some will even suspend the server permanentlylukapaunovic wrote: ↑Sat Apr 07, 2018 8:11 pmThis matter needs to be looked into by core of VestaCP team immediately.
it's the matter of time when other providers and server will get hacked.
We need fix ASAP
- Sat Apr 07, 2018 8:15 pm
- Forum: General Discussion
- Topic: Two servers are hacked today via Vestacp
- Replies: 21
- Views: 28092
Re: Two servers are hacked today via Vestacp
who are not hacked for now stop vesta service :
Code: Select all
service vesta stop
- Sat Apr 07, 2018 8:07 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 709664
Re: Got 10 VestaCP servers exploited
viewtopic.php?f=10&t=16558&p=68543
some more info about the attack
some more info about the attack
- Sat Apr 07, 2018 8:00 pm
- Forum: General Discussion
- Topic: Two servers are hacked today via Vestacp
- Replies: 21
- Views: 28092
Two servers are hacked today via Vestacp
Today afternoon just finished my launch and got email from server provider that your server is sending outbound ddos attack. upon investigation I found some suspicious processes are running in the server and network usage is full (checked via glances). Upon more investigation I finally found this su...