Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Got 10 VestaCP servers exploited

General questions about VestaCP
Locked
  • Print view
Advanced search
549 posts
  • Page 14 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • 55
  • Next
sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sun Apr 08, 2018 12:08 pm

lukapaunovic wrote: ↑
Sun Apr 08, 2018 12:02 pm
Hey here are affected files in that time range see

Image
don't aim roundcube as the exploit i don't have roundcube on my servers even phpmyadmin, i disabled them and deleted it still got hacked.
Top

Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sun Apr 08, 2018 12:08 pm

lukapaunovic wrote: ↑
Sun Apr 08, 2018 12:02 pm
Hey here are affected files in that time range see

Image
Can you check what version of Roundcube that is on the system?
Top

ivcha92
Posts: 26
Joined: Thu Nov 17, 2016 2:25 pm
Contact:
Contact ivcha92
Website Facebook

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by ivcha92 » Sun Apr 08, 2018 12:09 pm

Image

I've got a bunch strange named files here created on April 3rd and 4th
Top

MAN5
Posts: 86
Joined: Sun Jan 31, 2016 4:14 am

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by MAN5 » Sun Apr 08, 2018 12:10 pm

StudioMaX wrote: ↑
Sun Apr 08, 2018 12:06 pm
Also I have good news: I binary compared all the files in two backups of the whole server, one from 03-04-2018 (before infection), the other from 07-04-2018. And it seems that this exploit did not modify any system files, but only created these:

Code: Select all

/etc/cron.hourly/gcc.sh
/etc/rc.d/init.d/update
/etc/rc.d/rc1.d/S90update
/etc/rc.d/rc2.d/S90update
/etc/rc.d/rc3.d/S90update
/etc/rc.d/rc4.d/S90update
/etc/rc.d/rc5.d/S90update
/usr/lib/libudev.so
/tmp/update
But in any case, if your server was infected, you will need to reinstall it.
Are you suspecting on that file S90update - is a culprit.?
What is the contents of that S90update file?
Top

StudioMaX
Posts: 33
Joined: Fri Aug 05, 2016 12:17 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by StudioMaX » Sun Apr 08, 2018 12:13 pm

Prime wrote: ↑
Sun Apr 08, 2018 12:08 pm
Can you check what version of Roundcube that is on the system?
On my installation I had the latest version - 1.3.5
MAN5 wrote: ↑
Sun Apr 08, 2018 12:10 pm
Are you suspecting on that file S90update - is a culprit.?
What is the contents of that S90update file?

Code: Select all

/etc/rc.d/rc1.d/S90update
/etc/rc.d/rc2.d/S90update
/etc/rc.d/rc3.d/S90update
/etc/rc.d/rc4.d/S90update
/etc/rc.d/rc5.d/S90update
- are just symlinks to "/etc/rc.d/init.d/update"

Its content:

Code: Select all

#!/bin/sh
# chkconfig: 12345 90 90
# description: update
### BEGIN INIT INFO
# Provides:		update
# Required-Start:	
# Required-Stop:	
# Default-Start:	1 2 3 4 5
# Default-Stop:		
# Short-Description:	update
### END INIT INFO
case $1 in
start)
	/tmp/update
	;;
stop)
	;;
*)
	/tmp/update
	;;
esac
Last edited by StudioMaX on Sun Apr 08, 2018 12:13 pm, edited 1 time in total.
Top

lukapaunovic
Posts: 73
Joined: Sun Dec 03, 2017 6:30 pm

Re: Got 10 VestaCP servers exploited

Post by lukapaunovic » Sun Apr 08, 2018 12:13 pm

1.35 version
Top

StudioMaX
Posts: 33
Joined: Fri Aug 05, 2016 12:17 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by StudioMaX » Sun Apr 08, 2018 12:19 pm

sandy wrote: ↑
Sun Apr 08, 2018 12:08 pm
don't aim roundcube as the exploit i don't have roundcube on my servers even phpmyadmin, i disabled them and deleted it still got hacked.
Do you mean you manually deleted already installed applications? Because Roundcube is installed automatically if you install the exim and the mysql, it can not be turned off when setting up the vesta.
Look here: https://github.com/serghey-rodin/vesta/ ... l.sh#L1201
Top

Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sun Apr 08, 2018 12:20 pm

StudioMaX wrote: ↑
Sun Apr 08, 2018 12:13 pm
Prime wrote: ↑
Sun Apr 08, 2018 12:08 pm
Can you check what version of Roundcube that is on the system?
On my installation I had the latest version - 1.3.
lukapaunovic wrote: ↑
Sun Apr 08, 2018 12:13 pm
1.35 version
Then I think we can eliminate the theory that Roundcube is the fault here.
Top

crackerizer
Posts: 11
Joined: Sun Apr 08, 2018 12:08 pm

Os: Ubuntu 15x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by crackerizer » Sun Apr 08, 2018 12:21 pm

One of my VPS at OVH got exploit this morning. I did reinstall the os and restored all accounts from my remote backup. I'm now monitoring any change in /etc with inotify. From the information I read here, it seems like all created executables have to be done with root access. The exploit has to be more than just bugs in Roundcube which is run under www-data user. My speculation.
Top

lukapaunovic
Posts: 73
Joined: Sun Dec 03, 2017 6:30 pm

Re: Got 10 VestaCP servers exploited

Post by lukapaunovic » Sun Apr 08, 2018 12:22 pm

I'm cheering it's not roundcube cuz another server didn't got hacked again with disabled Vesta. I'm still keeping this hacked server mounted in rescue until sergehey is back. I truly hope he will be back my client is insisting on puting sites back up
Top


Locked
  • Print view

549 posts
  • Page 14 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • 55
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password