Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

All VestaCP installations being attacked Topic is solved

General questions about VestaCP
Locked
  • Print view
Advanced search
231 posts
  • Page 8 of 24
    • Jump to page:
  • Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 24
  • Next
iddir
Posts: 2
Joined: Wed Sep 26, 2018 9:55 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by iddir » Wed Sep 26, 2018 9:58 pm

vikhyat wrote: ↑
Wed Sep 26, 2018 6:48 pm
I suggest switching to SSH key only login which according to me is a really simple and best fix without worrying about new hacks as I have experienced it.
Hi, i have been hacked in april/may and now again (yesterday, 2 Clouds) and i'm only using SSH key to log. So you won't be safe for this hack even if you are using ssh key.

EDIT: vesta installed since august for both cloud that has been hacked yesterday.

i now remember another hack from the 1st august were i did DDOS to the same IP as other people who have been hacked in september (myself included).

Attack detail : 10Kpps/81Mbps
dateTime srcIp:srcPort dstIp:dstPort protocol flags packets bytes reason
2018.08.01 10:33:41 CEST 176.31.115.152:13003 144.0.2.180:80 TCP SYN

This one was installed since january and got hacked the 1st august
Top

Liam
Posts: 3
Joined: Sat Jul 02, 2016 11:22 am

Re: All VestaCP installations being attacked

Post by Liam » Thu Sep 27, 2018 12:45 am

Here's the attack log my provider gave me, with my VM's IP Address being replaced with <VM IP>.

Code: Select all

ipv4 2 tcp 6 40 SYN_SENT src=<VM IP> dst=116.211.168.63 sport=12558 dport=80 [UNREPLIED] src=116.211.168.63 dst=<VM IP> sport=80 dport=12558 mark=0 secmark=0 use=2
ipv4 2 tcp 6 2 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=62127 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=62127 mark=0 secmark=0 use=2
ipv4 2 tcp 6 92 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=33896 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=33896 mark=0 secmark=0 use=2
ipv4 2 tcp 6 26 SYN_SENT src=<VM IP> dst=116.211.168.63 sport=29526 dport=80 [UNREPLIED] src=116.211.168.63 dst=<VM IP> sport=80 dport=29526 mark=0 secmark=0 use=2
ipv4 2 tcp 6 45 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=47494 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=47494 mark=0 secmark=0 use=2
ipv4 2 tcp 6 98 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=11174 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=11174 mark=0 secmark=0 use=2
ipv4 2 tcp 6 70 SYN_SENT src=<VM IP> dst=116.211.168.63 sport=649 dport=80 [UNREPLIED] src=116.211.168.63 dst=<VM IP> sport=80 dport=649 mark=0 secmark=0 use=2
ipv4 2 tcp 6 35 SYN_SENT src=<VM IP> dst=116.211.168.63 sport=6718 dport=80 [UNREPLIED] src=116.211.168.63 dst=<VM IP> sport=80 dport=6718 mark=0 secmark=0 use=2
ipv4 2 tcp 6 42 SYN_SENT src=<VM IP> dst=116.211.168.63 sport=21999 dport=80 [UNREPLIED] src=116.211.168.63 dst=<VM IP> sport=80 dport=21999 mark=0 secmark=0 use=2
ipv4 2 tcp 6 95 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=5797 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=5797 mark=0 secmark=0 use=2
ipv4 2 tcp 6 17 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=46857 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=46857 mark=0 secmark=0 use=2
ipv4 2 tcp 6 81 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=53976 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=53976 mark=0 secmark=0 use=2
ipv4 2 tcp 6 22 SYN_SENT src=<VM IP> dst=116.211.168.63 sport=59385 dport=80 [UNREPLIED] src=116.211.168.63 dst=<VM IP> sport=80 dport=59385 mark=0 secmark=0 use=2
ipv4 2 tcp 6 117 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=42659 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=42659 mark=0 secmark=0 use=2
ipv4 2 tcp 6 18 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=55428 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=55428 mark=0 secmark=0 use=2
ipv4 2 tcp 6 61 SYN_SENT src=<VM IP> dst=121.29.57.214 sport=55477 dport=80 [UNREPLIED] src=121.29.57.214 dst=<VM IP> sport=80 dport=55477 mark=0 secmark=0 use=2
I hope this is the same vulnerability and not another unknown exploit. These stopped when I changed my SSH port, changed the 'admin' password and installed CSF with SYNFLOOD protection. I have VestaCP's GUI turned off while we still have no idea what's going on.

If there are any logs the admins wish to see I'd be more than happy to check my infected instance and pass them on.
Top

dpeca
VestaCP Team
Posts: 473
Joined: Wed Nov 25, 2015 7:30 pm

Re: All VestaCP installations being attacked

Post by dpeca » Thu Sep 27, 2018 7:56 am

vikhyat wrote: ↑
Wed Sep 26, 2018 6:48 pm
I suggest switching to SSH key only login which according to me is a really simple and best fix without worrying about new hacks as I have experienced it.
Better idea - https://www.ostechnix.com/allow-deny-ss ... oup-linux/

Code: Select all

vi /etc/ssh/sshd_config
#add
PermitRootLogin without-password
DenyUsers admin

systemctl restart sshd
WARNING: GENERATE and GET root SSH key before you do this!!!

but anyway this will not prevent system compromising if somewhere he can execute shell commands...
Top

Maverick87Shaka
Posts: 4
Joined: Tue Aug 07, 2018 9:37 am

Os: Debian 8x
Web: nginx + php-fpm
Re: All VestaCP installations being attacked

Post by Maverick87Shaka » Thu Sep 27, 2018 9:07 am

@realjumy can you try to edit you original post adding a poll asking the infected server? Maybe It's help to understand how many server was infected.

Just a simple question on Number of server infected, and people select how many of their server was infected ;)
Top

pksh71
Posts: 3
Joined: Tue Jun 26, 2018 7:47 am

Os: CentOS 5x
Web: nginx + php-fpm
Re: All VestaCP installations being attacked

Post by pksh71 » Thu Sep 27, 2018 11:16 am

Dear All,

All my VPS at OVH is attacked and is suspended by OVH this happened on 24-sep-2018. we have almost 103 VPS in OVH.
We have no way to get our data out from OVH VPS as they dont allow us.
what can we do?

regards
Top

ScIT
Support team
Posts: 617
Joined: Mon Feb 23, 2015 4:13 pm

Os: Ubuntu 17x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by ScIT » Thu Sep 27, 2018 1:10 pm

pksh71 wrote: ↑
Thu Sep 27, 2018 11:16 am
Dear All,

All my VPS at OVH is attacked and is suspended by OVH this happened on 24-sep-2018. we have almost 103 VPS in OVH.
We have no way to get our data out from OVH VPS as they dont allow us.
what can we do?

regards
i dont know a lot about OVH, but I think you can ask them to boot the server in rescue mode to recover your data - just contact their support.
Top

httpd
Posts: 3
Joined: Tue Sep 25, 2018 12:11 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by httpd » Thu Sep 27, 2018 3:01 pm

pksh71 wrote: ↑
Thu Sep 27, 2018 11:16 am
Dear All,

All my VPS at OVH is attacked and is suspended by OVH this happened on 24-sep-2018. we have almost 103 VPS in OVH.
We have no way to get our data out from OVH VPS as they dont allow us.
what can we do?

regards
Support of firstvds.ru can block all ports for my vps, except ssh, and them turn on server. Maybe you can trought this way?
Top

mp2017
Posts: 2
Joined: Fri Jul 20, 2018 12:40 pm

Os: Debian 7x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by mp2017 » Thu Sep 27, 2018 5:58 pm

Also got a notification from AWS that my server is involved into DoS on that chinese IP - i've checked and confirm that my server is compromised and Vesta is not opening.
starting to getting tired of this s#it.
Top

luizjr
Posts: 8
Joined: Thu Dec 21, 2017 5:52 pm
Contact:
Contact luizjr
Website Facebook Skype Twitter

Os: Ubuntu 17x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by luizjr » Fri Sep 28, 2018 12:04 am

ctrlpac wrote: ↑
Tue Sep 25, 2018 12:11 pm
That's seems a CRITICAL issue. I need to identify that.

Please @vestacp team, if you need any help, don't hesitate to contact me!
As it is an open source and has knowledge for such, you can rather help and show them the solution.

The faster the better.
Top

luizjr
Posts: 8
Joined: Thu Dec 21, 2017 5:52 pm
Contact:
Contact luizjr
Website Facebook Skype Twitter

Os: Ubuntu 17x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by luizjr » Fri Sep 28, 2018 12:06 am

realjumy wrote: ↑
Tue Sep 25, 2018 2:21 pm
dpeca wrote: ↑
Tue Sep 25, 2018 2:15 pm
In what datacenter are those servers?
Mine and my friends' are in OVH. I don't know other people.
Mine too
On average 10 servers
Top


Locked
  • Print view

231 posts
  • Page 8 of 24
    • Jump to page:
  • Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 24
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password