Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Got 10 VestaCP servers exploited

General questions about VestaCP
Locked
  • Print view
Advanced search
549 posts
  • Page 21 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • …
  • 55
  • Next
Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sun Apr 08, 2018 4:14 pm

soguor wrote: ↑
Sun Apr 08, 2018 4:07 pm
Hi, I've two vps on ovh with attack, I downloaded the three last backups of vesta from /backup and was reinstalled the S.O. (Debian 9) with vestacp. I was restore the backup on new installation and change port of vestacp. At the moment, i monitoring and don't see anything wrong. On my VPSs, the archives of /backup don't they affected (at the moment).
The problem isn't fixed and therefore it's a not a good idea to leave it open.. you'll just end up with another infected machine.
Top

damian
Posts: 1
Joined: Sun Apr 08, 2018 4:05 pm

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by damian » Sun Apr 08, 2018 4:17 pm

Experienced the same hack on my VestaCP server (CentOS 7.x) earlier today, came across this thread only now. Deleting the malicious script only caused gcc.sh to reinstall it. Followed the steps outlined here: https://superuser.com/a/1004724 to change /lib/ folder permissions, secure cron permissions, delete the initial scripts, and afterwards deleted the libudev.so file.

Note that a cron is added to both the cron.hourly file as well as the cron.hourly/ folder

Hope this helps someone!
Top

soguor
Posts: 13
Joined: Sun Apr 08, 2018 3:56 pm

Os: Ubuntu 17x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by soguor » Sun Apr 08, 2018 4:52 pm

Prime wrote: ↑
Sun Apr 08, 2018 4:14 pm
soguor wrote: ↑
Sun Apr 08, 2018 4:07 pm
Hi, I've two vps on ovh with attack, I downloaded the three last backups of vesta from /backup and was reinstalled the S.O. (Debian 9) with vestacp. I was restore the backup on new installation and change port of vestacp. At the moment, i monitoring and don't see anything wrong. On my VPSs, the archives of /backup don't they affected (at the moment).
The problem isn't fixed and therefore it's a not a good idea to leave it open.. you'll just end up with another infected machine.
I know the risk, but can't have this servers stopped.
Top

Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sun Apr 08, 2018 4:55 pm

soguor wrote: ↑
Sun Apr 08, 2018 4:52 pm
I kown the risk, but can't have this servers stopped.
Kill the vesta service at least if you want to keep the machine running.
Top

DarthVader
Posts: 31
Joined: Wed Jul 13, 2016 1:35 pm

Re: Got 10 VestaCP servers exploited

Post by DarthVader » Sun Apr 08, 2018 5:10 pm

Prime wrote: ↑
Sun Apr 08, 2018 4:55 pm
soguor wrote: ↑
Sun Apr 08, 2018 4:52 pm
I kown the risk, but can't have this servers stopped.
Kill the vesta service at least if you want to keep the machine running.
What if add die() to /usr/local/vesta/web/api/index.php
This could resolve problem?
Top

igorus
Posts: 1
Joined: Sun Apr 08, 2018 5:13 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by igorus » Sun Apr 08, 2018 5:17 pm

soguor wrote: ↑
Sun Apr 08, 2018 4:52 pm
I know the risk, but can't have this servers stopped.
I have many servers with VestaCP. The only one without IP restriction for VestaCP got this infection.
So, protect port 8083 and you will be fine, I think.
Top

sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sun Apr 08, 2018 5:37 pm

so it isn't roundcube issue rather vulnerability is in vesta core files and vesta team assured security patch tomorrow. Wait for it.
Top

vesta_mtl
Posts: 70
Joined: Wed Dec 21, 2016 2:08 pm

Re: Got 10 VestaCP servers exploited

Post by vesta_mtl » Sun Apr 08, 2018 5:52 pm

Thanks for sharing this link. I cannot access Vesta GUI today on my DigialOcean servers. This DigitalOcean message saying they have blocked inbound traffic to 8083 seems to explain it (I have other servers on Vultr which still work). Once DigitalOcean re-opens the access to 8083, what is recommended so that I can protect my Vesta GUI?
Prime wrote: ↑
Sun Apr 08, 2018 3:35 pm
Wonder how many hosts that are infected, considering this...

Code: Select all

Our engineering team continues to work to resolve the networking issue impacting our NYC regions. We believe a previously undisclosed vulnerability in software by some customers on their Droplets is allowing for denial of service (DoS) attacks against targets outside of DigitalOcean. Our Trust & Safety team is also engaged to resolve this incident; in an effort to protect unaffected Droplets, we will block inbound traffic to TCP/8083. 

We will continue to post updates here as more information becomes available, and we will provide additional guidance for customers to determine whether their Droplets are impacted, and how to work around the block to continue to safely access their software.
https://status.digitalocean.com/incidents/jzszyktwsrss
Top

sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sun Apr 08, 2018 6:03 pm

vesta_mtl wrote: ↑
Sun Apr 08, 2018 5:52 pm
Thanks for sharing this link. I cannot access Vesta GUI today on my DigialOcean servers. This DigitalOcean message saying they have blocked inbound traffic to 8083 seems to explain it (I have other servers on Vultr which still work). Once DigitalOcean re-opens the access to 8083, what is recommended so that I can protect my Vesta GUI?
Prime wrote: ↑
Sun Apr 08, 2018 3:35 pm
Wonder how many hosts that are infected, considering this...

Code: Select all

Our engineering team continues to work to resolve the networking issue impacting our NYC regions. We believe a previously undisclosed vulnerability in software by some customers on their Droplets is allowing for denial of service (DoS) attacks against targets outside of DigitalOcean. Our Trust & Safety team is also engaged to resolve this incident; in an effort to protect unaffected Droplets, we will block inbound traffic to TCP/8083. 

We will continue to post updates here as more information becomes available, and we will provide additional guidance for customers to determine whether their Droplets are impacted, and how to work around the block to continue to safely access their software.
https://status.digitalocean.com/incidents/jzszyktwsrss
they can only blocks ports during attacks the main issue is the CP script we're using. As DDOS attack are not allowed on 99% of hosts.
Top

Trentor
Posts: 84
Joined: Fri Apr 25, 2014 6:42 pm

Re: Got 10 VestaCP servers exploited

Post by Trentor » Sun Apr 08, 2018 6:03 pm

vesta_mtl wrote: ↑
Sun Apr 08, 2018 5:52 pm
Once DigitalOcean re-opens the access to 8083, what is recommended so that I can protect my Vesta GUI?
If you can access to your server via SSH, you are able to change the port of VestaCP right now.
  • Choose a new port
  • If it's neccesary, open the new port in your firewall
  • Edit your VestaCP nginx config

Code: Select all

/usr/local/vesta/nginx/conf/nginx.conf
  • Search for this line and modify 8083 with your new port

Code: Select all

server {
        listen          8083;
  • Restart your server or, at least VestaCP and your firewall
  • Then, you can close 8083 in your firewall if you want
  • Check if you are able to connect to your VestaCP installation in the new port
Top


Locked
  • Print view

549 posts
  • Page 21 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • …
  • 55
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password