We are happy to announce that Vesta is back under active development as of 25 February 2024. We are working on Vesta 2.0 and expect to release it by the end of 2024. Read more about it: https://vestacp.com/docs/vesta-2-development
Got 10 VestaCP servers exploited
Re: Got 10 VestaCP servers exploited
Who said that we are resting?
Re: Got 10 VestaCP servers exploited
Because there are no any information that would tell the cause of the infection of the servers, I tried to find it myself. In existing logs, there are no other authorizations, no suspicious requests to nginx and apache.
Re: Got 10 VestaCP servers exploited
highlander wrote: ↑Sun Apr 08, 2018 10:02 amI am sending tooimperio wrote: ↑Sun Apr 08, 2018 9:30 amWho want provide access to hacked server?
Please, send access via [email protected]
Re: Got 10 VestaCP servers exploited
thats the fact of vestacp developers they are careless, don't take me wrong i'm suffering from losses. You and we don't want this types of inconvenience in future.
Re: Got 10 VestaCP servers exploited
I think you're being arrogant as you're not paying a cent for VestaCP. If it's business critical, the fault is yours for not paying for a service level agreement and using a freeware solution in the first place.
Re: Got 10 VestaCP servers exploited
sandy, stop blaming us. In the next time I'll give you a warning.
Re: Got 10 VestaCP servers exploited
My two VestaCp installed server is suspended due to attack of the other networks.
I checked one of them and I found gcc.sh in /etc/cron.hourly. It is created on 4 April 2018.
Info: After installation I changed VestaCp port to another port.
I checked one of them and I found gcc.sh in /etc/cron.hourly. It is created on 4 April 2018.
Info: After installation I changed VestaCp port to another port.