Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Got 10 VestaCP servers exploited

General questions about VestaCP
Locked
  • Print view
Advanced search
549 posts
  • Page 6 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 55
  • Next
dpeca
VestaCP Team
Posts: 473
Joined: Wed Nov 25, 2015 7:30 pm

Re: Got 10 VestaCP servers exploited

Post by dpeca » Sat Apr 07, 2018 10:33 pm

StudioMaX wrote: ↑
Sat Apr 07, 2018 8:40 pm
Moderators: please post instructions how to enable logging in all the web interfaces of Vesta (in nginx or Apache) so that those who find this thread after the hacking could temporarily change their configs of the web server and try to catch the requests from the exploit.
https://pastebin.com/sj8uWAr4

but i don't suggest to run now vesta service at all.
Top

n0x
Posts: 16
Joined: Sat Apr 07, 2018 10:30 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by n0x » Sat Apr 07, 2018 10:36 pm

Just to add to another installation hacked - Got notified by DigitalOcean today of an outbound DDoS from two VMs at 14:42 with about 1 Gbps outbound on both machines.

They've cut all network access to the VMs and won't restore so I can't provide access for any investigations, in the process of restoring to new VMs from backups at the moment.

Installation was Ubuntu 16.04 with Vesta 0.9.8-19. Both VMs had apache, nginx, bind, exim/dovecot, mysql, iptables + fail2ban and vsftpd installed.

I've got some limited, very slow, console access to the VMs until they get rebooted / destroyed.
Top

dpeca
VestaCP Team
Posts: 473
Joined: Wed Nov 25, 2015 7:30 pm

Re: Got 10 VestaCP servers exploited

Post by dpeca » Sat Apr 07, 2018 10:44 pm

usr999 wrote: ↑
Sat Apr 07, 2018 8:57 pm
Can't delete virus body, after delete it always restored /usr/lib/libudev.so
try this manual - https://admin-ahead.com/forum/server-se ... ts-trojan/
Top

skurudo
VestaCP Team
Posts: 8099
Joined: Fri Dec 26, 2014 2:23 pm
Contact:
Contact skurudo
Website Facebook Google+ Skype
Twitter

Re: Got 10 VestaCP servers exploited

Post by skurudo » Sat Apr 07, 2018 10:46 pm

n0x wrote: ↑
Sat Apr 07, 2018 10:36 pm
They've cut all network access to the VMs and won't restore so I can't provide access for any investigations, in the process of restoring to new VMs from backups at the moment.
They disable Console access too?
Top

n0x
Posts: 16
Joined: Sat Apr 07, 2018 10:30 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by n0x » Sat Apr 07, 2018 10:52 pm

skurudo wrote: ↑
Sat Apr 07, 2018 10:46 pm
They disable Console access too?
Nope - I can get on via the console, but it is very slow and for some reason the | pipe command comes out as > no matter what I do so I'm limited on commands I can run too.

I have the same /lib/libudev.so.6 in my crontab:

Code: Select all

for i in `cat /proc/net/dev|grep :|awk -F: {'print $1'}`; do ifconfig $i up& done
cp /lib/libudev.so /lib/libudev.so.6
/lib/libudev.so.6
Top

skurudo
VestaCP Team
Posts: 8099
Joined: Fri Dec 26, 2014 2:23 pm
Contact:
Contact skurudo
Website Facebook Google+ Skype
Twitter

Re: Got 10 VestaCP servers exploited

Post by skurudo » Sat Apr 07, 2018 11:19 pm

n0x wrote: ↑
Sat Apr 07, 2018 10:52 pm
skurudo wrote: ↑
Sat Apr 07, 2018 10:46 pm
They disable Console access too?
Nope - I can get on via the console, but it is very slow and for some reason the | pipe command comes out as > no matter what I do so I'm limited on commands I can run too.
Can you please provide access via [email protected]?

If not use commands and spoiler and show us:

Code: Select all

stat /etc/cron.hourly/gcc.sh

Code: Select all

ls -la /usr/local/vesta/data/sessions/
Top

n0x
Posts: 16
Joined: Sat Apr 07, 2018 10:30 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by n0x » Sat Apr 07, 2018 11:45 pm

skurudo wrote: ↑
Sat Apr 07, 2018 11:19 pm
n0x wrote: ↑
Sat Apr 07, 2018 10:52 pm
skurudo wrote: ↑
Sat Apr 07, 2018 10:46 pm
They disable Console access too?
Nope - I can get on via the console, but it is very slow and for some reason the | pipe command comes out as > no matter what I do so I'm limited on commands I can run too.
Can you please provide access via [email protected]?

If not use commands and spoiler and show us:

Code: Select all

stat /etc/cron.hourly/gcc.sh

Code: Select all

ls -la /usr/local/vesta/data/sessions/
I've run the commands, have to screenshot as can't copy / paste from console (also only get half a screen and as I can't use the | command I can't paginate the ls output so dumped to text file and screen grab from nano)

Code: Select all

stat /etc/cron.hourly/gcc.sh
SpoilerShow
Image

Code: Select all

ls -la /usr/local/vesta/data/sessions/
SpoilerShow
Image
Image
I'll see if I can get the VM into a team account that I can share, but DigitalOcean are going to destroy it soon and spin up a new/clean VM.
Top

skivte
Posts: 2
Joined: Fri Apr 11, 2014 8:11 am

Re: Got 10 VestaCP servers exploited

Post by skivte » Sat Apr 07, 2018 11:49 pm

skurudo wrote: ↑
Sat Apr 07, 2018 11:19 pm
Can you please provide access via [email protected]?

If not use commands and spoiler and show us:
I'm on DigitalOcean as well and I can't give access to or copy text from their web console but here are screenshots of each command:

Code: Select all

stat /etc/cron.hourly/gcc.sh
https://i.imgur.com/VkoD4UZ.png

Code: Select all

ls -la /usr/local/vesta/data/sessions/
https://i.imgur.com/JZHOmpU.png
Top

n0x
Posts: 16
Joined: Sat Apr 07, 2018 10:30 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by n0x » Sat Apr 07, 2018 11:57 pm

n0x wrote: ↑
Sat Apr 07, 2018 11:45 pm
I'll see if I can get the VM into a team account that I can share, but DigitalOcean are going to destroy it soon and spin up a new/clean VM.
I can't find a way to move individual VMs / droplets into a team account so that I can share them with other users.

Let me know if you need any other commands run on the VM.
Top

dpeca
VestaCP Team
Posts: 473
Joined: Wed Nov 25, 2015 7:30 pm

Re: Got 10 VestaCP servers exploited

Post by dpeca » Sun Apr 08, 2018 12:51 am

GID od gcc.sh is always 1001 or 1002 - just noticed that, from screenshot that user provided
Top


Locked
  • Print view

549 posts
  • Page 6 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 55
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password