Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Got 10 VestaCP servers exploited

General questions about VestaCP
Locked
  • Print view
Advanced search
549 posts
  • Page 28 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 26
  • 27
  • 28
  • 29
  • 30
  • …
  • 55
  • Next
lukapaunovic
Posts: 73
Joined: Sun Dec 03, 2017 6:30 pm

Re: Got 10 VestaCP servers exploited

Post by lukapaunovic » Sun Apr 08, 2018 10:50 pm

After this the best thing to do is to get backups and reinstall server and restore it
It's hassle free and you'll keep peace of mind
Top

ivcha92
Posts: 26
Joined: Thu Nov 17, 2016 2:25 pm
Contact:
Contact ivcha92
Website Facebook

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by ivcha92 » Sun Apr 08, 2018 10:54 pm

Just did an update using CLI please note that /usr/local/vesta/nginx/nginx.conf was not updated

Access log should be manualy enabled after update for easier debugging in future
Top

pipoy
Posts: 112
Joined: Mon Sep 11, 2017 8:02 am

Os: CentOS 6x
Web: apache
Re: Got 10 VestaCP servers exploited

Post by pipoy » Sun Apr 08, 2018 11:10 pm

everything is still the same with my server.

I already deleted /lib/libudev.so and gcc.sh it just keeps coming back

and these random letters in /etc/init.d
Top

imperio
VestaCP Team
Posts: 7000
Joined: Sat Dec 01, 2012 12:37 pm
Contact:
Contact imperio
Website

Re: Got 10 VestaCP servers exploited

Post by imperio » Sun Apr 08, 2018 11:13 pm

I already deleted /lib/libudev.so and gcc.sh it just keeps coming back
try to search and kill active virus process (procesess)
Top

pipoy
Posts: 112
Joined: Mon Sep 11, 2017 8:02 am

Os: CentOS 6x
Web: apache
Re: Got 10 VestaCP servers exploited

Post by pipoy » Sun Apr 08, 2018 11:29 pm

imperio wrote: ↑
Sun Apr 08, 2018 11:13 pm
I already deleted /lib/libudev.so and gcc.sh it just keeps coming back
try to search and kill active virus process (procesess)
Thanks.

I chmod 0000 first the libudev.so before removing it like what your link said.

Removing it head on will just instantly generate a new one.

Looks like that my server is stable now. Ill give update to this thread.
Top

Razza
Posts: 5
Joined: Sun Apr 08, 2018 11:17 pm

Os: Debian 8x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Razza » Sun Apr 08, 2018 11:31 pm

Version 0.9.8-20 Dose not seem to be released for Debain 9.

Code: Select all

apt-get -qq update &&apt-cache show vesta|grep "Version"
Version: 0.9.8-19
Top

crackerizer
Posts: 11
Joined: Sun Apr 08, 2018 12:08 pm

Os: Ubuntu 15x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by crackerizer » Mon Apr 09, 2018 12:09 am

Updated to V20 but still monitoring.

for the POST log, it seems like the hacker removed my IP from his pool. No trace of access from him since.
Top

pipoy
Posts: 112
Joined: Mon Sep 11, 2017 8:02 am

Os: CentOS 6x
Web: apache
Re: Got 10 VestaCP servers exploited

Post by pipoy » Mon Apr 09, 2018 12:35 am

I am also monitoring. 1 hr after, so far so good.

Im not sure if I was out of his pool, but definitely the viruses are not replicating itself anymore.

How did someone knew the people who uses vestacp anyway?
Top

dpeca
VestaCP Team
Posts: 473
Joined: Wed Nov 25, 2015 7:30 pm

Re: Got 10 VestaCP servers exploited

Post by dpeca » Mon Apr 09, 2018 12:57 am

For those people that want to help us with honeypots.

In /usr/local/vesta/web/api/index.php
after first line, please add this line:

Code: Select all

file_put_contents('/tmp/postlog.txt', 'API: '.$_SERVER["REMOTE_ADDR"] . ' = ' .  print_r($_POST, true), FILE_APPEND);
In /usr/local/vesta/web/login/index.php
after first line, please add this line:

Code: Select all

file_put_contents('/tmp/postlog.txt', 'LOGIN: '.$_SERVER["REMOTE_ADDR"] . ' = ' .  print_r($_POST, true), FILE_APPEND);
Then, via SSH, do

Code: Select all

tailf /tmp/postlog.txt
from your computer (or from other server), and when you see strange codes send us to [email protected]

DO NOT this on production servers (because file will contains all passwords and file will be readable for any user on server)
Top

Mag37
Posts: 1
Joined: Mon Apr 09, 2018 1:13 am

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Mag37 » Mon Apr 09, 2018 1:38 am

I everyone I just want to ask few simple questions :
  • Were any of the VestCP install on HTTPS ?
  • Is it a good idea to change VestaCP port 8083 ? (= stealth mode)
My instalation is and did not get hacked (I have turned it off as I write)
I am on Ubuntu 16.04 - Apache Nginx
the entire install is on https (letsencrypt)
One note with my install is that Roundcube does not function at this time
database connection error... Will fix that later

I have turn off my server at this time. Will upgrade ASAP

Thanks and good Luck guys

PS: my Host emailed me about this issue.
Top


Locked
  • Print view

549 posts
  • Page 28 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 26
  • 27
  • 28
  • 29
  • 30
  • …
  • 55
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password