Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

All VestaCP installations being attacked Topic is solved

General questions about VestaCP
Locked
  • Print view
Advanced search
231 posts
  • Page 13 of 24
    • Jump to page:
  • Previous
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 24
  • Next
maman
Posts: 17
Joined: Mon Aug 27, 2018 3:05 pm

Os: CentOS 4x
Web: apache
Re: All VestaCP installations being attacked

Post by maman » Mon Oct 01, 2018 11:54 am

dpeca wrote: ↑
Mon Oct 01, 2018 8:56 am
When you are an attacker, and when you scan a milion of IP addresses, you don't have 15 minutes per one IP (to scan all 65535 ports)... you just check 22, 8083, eventualy 2022 or 2222, and then you go to next IP...
maybe if i'm the attacker i will not do like that.
here's what i will do instead:
From that millions ip i need to filter which is using VESTACP (maybe by fecthing each http://[IP-ADDRESS] and see which has 'Powered by VESTA' in it).
So for that millions ip maybe I get 5000 IP that uses VESTA using that 1 fingerprint. Now the the target is way way way smaller to do the port scanning.
Top

dpeca
VestaCP Team
Posts: 473
Joined: Wed Nov 25, 2015 7:30 pm

Re: All VestaCP installations being attacked

Post by dpeca » Mon Oct 01, 2018 12:00 pm

maman wrote: ↑
Mon Oct 01, 2018 11:54 am
maybe if i'm the attacker i will not do like that.
here's what i will do instead:
From that millions ip i need to filter which is using VESTACP (maybe by fecthing each http://[IP-ADDRESS] and see which has 'Powered by VESTA' in it).
So for that millions ip maybe I get 5000 IP that uses VESTA using that 1 fingerprint. Now the the target is way way way smaller to do the port scanning.
Maybe that can explain how servers with changed port get hacked...
Top

pqpk2009
Posts: 45
Joined: Sun Mar 27, 2016 2:23 am

Re: All VestaCP installations being attacked

Post by pqpk2009 » Tue Oct 02, 2018 12:30 pm

flanders wrote: ↑
Mon Oct 01, 2018 11:08 am
I have 3 servers with vesta. Only 1 is attacked.Always the same server. 2 servers are working well (they are in the same host), that attacked is in other host. I rebuild it many times, changed ip server, hostname, password, ssh port, permit root login without-password but each day it is attacked... I don't know how solve this situation....
Admin account default password change?
If there is no modification, the password generation algorithm is cracked.
Top

Spheerys
Posts: 225
Joined: Tue Dec 29, 2015 12:36 pm

Os: Debian 7x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by Spheerys » Tue Oct 02, 2018 4:35 pm

How can I check if my server is compromised ?
Top

pqpk2009
Posts: 45
Joined: Sun Mar 27, 2016 2:23 am

Re: All VestaCP installations being attacked

Post by pqpk2009 » Tue Oct 02, 2018 6:13 pm

Spheerys wrote: ↑
Tue Oct 02, 2018 4:35 pm
How can I check if my server is compromised ?
It seems that there is no way to know DDOS after hijacking attacks China's servers.
Top

httpd
Posts: 3
Joined: Tue Sep 25, 2018 12:11 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by httpd » Thu Oct 04, 2018 12:10 pm

Official comments from vesta developers whether will written?
Top

flanders
Posts: 11
Joined: Thu Jun 12, 2014 4:46 pm

Os: CentOS 6x
Web: nginx + php-fpm
Re: All VestaCP installations being attacked

Post by flanders » Thu Oct 04, 2018 12:30 pm

I rebuild my server. Now I changed the vestacp port too (only access with key, custom ssh port, protocol 2) it is working from 2 days for me. The only difference from the last attack is the vestacp port.
Top

kandalf
Posts: 87
Joined: Tue May 13, 2014 11:53 pm

Re: All VestaCP installations being attacked

Post by kandalf » Fri Oct 05, 2018 10:11 am

How can we know if our server is compromised?
Top

mehargags
Support team
Posts: 1096
Joined: Sat Sep 06, 2014 9:58 pm
Contact:
Contact mehargags
Website Skype

Os: Debian 8x
Web: apache + nginx
Re: All VestaCP installations being attacked

Post by mehargags » Mon Oct 08, 2018 12:53 pm

None of the panels uses Nginx as reverse proxy to Apache... thats a big plus for Vesta hands down. The biggest reason for performance on a default config. Atleast that was the most attractive point for me 5 years back when I started using it
Top

Akinola
Posts: 1
Joined: Mon Oct 08, 2018 2:18 pm

Os: Debian 7x
Web: apache
Re: All VestaCP installations being attacked

Post by Akinola » Mon Oct 08, 2018 2:20 pm

Razza wrote: ↑
Tue Sep 25, 2018 4:55 pm
My dev server got compromise as the password for admin user got changed, lucky I had the shell for admin user set to rssh so that attempt to run the payload in /var/tmp got blocked.

Heres the attempted command run via ssh from ip:45.76.146.8 command: echo "9WlgVjGkot" | sudo -S -p "" chmod 0777 /var/tmp/creator-x86_64-1 && echo "9WlgVjGkot" | sudo -S -p "" /var/tmp/creator-x86_64-1 &>/dev/null && echo "9WlgVjGkot" | sudo -S -p "" rm -f /var/log/auth.log /var/log/secure

Here the virustotal of the payload https://www.virustotal.com/#/file/b2c55 ... /detection will provide creator-x86_64-1 file to the admin on request.
Thanks for the link.
Top


Locked
  • Print view

231 posts
  • Page 13 of 24
    • Jump to page:
  • Previous
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 24
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password