Diese Seite (Version-1) wurde zuletzt am 28-März-2017 14:37 von Administrator geändert.

Du bist nicht autorisiert, diese Seite umzubenennen.

Du bist nicht autorisiert, diese Seite zu löschen.

Versionsgeschichte der Seite

Version Zuletzt geändert Größe Autor Änderungen Kommentar

Links

Eingehende Links Ausgehende Links

Versionsunterschiede

Unterschiede zwischen Version und .

Zeile 1: 67 Zeilen hinzugefügt.
[{ALLOW view All}]
[{ALLOW edit Authenticated}]
On 16.03.2017 my server was hacked for 2 days and created 632 Gb traffic. Luckily netcup does not charge for traffic.\\
The reason was that I had two security leaks, I guess it was "DirtyCow", but the Struts framework was also vulnerable.
What I did:\\
1. The root password was changed > reset a new via the netcup console\\
2. Updated [struts|https://struts.apache.org/download.cgi#struts25101] libraries in two web applications\\
3. updated Ubuntu to 3.13.0-112 to, see [DigitalOcean|https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-dirty-cow-linux-vulnerability]
{{{
apt-get update
apt-get upgrade
}}}
Note: if upgrade fails due to disk capacity, delete old update files in /boot\\
4. Analysis, searched for changed files the last two days / last 60 min:
{{{
find . -mtime -2
find . -mmin -60
}}}
5. found user "cloudy_root", removed
{{{
userdel -r cloudy_root
}}}
6. found changing init.d processes, removed like
{{{
update-rc.d -f lmpjqnxuao remove
}}}
7. found changing executables in /usr/bin, removed, like
{{{
rm lmpjqnxuao
}}}
8. the processes reinstalled itself, so I blocked traffic, which came from IP 198.*, 69.*, 204.*, 46.*
{{{
netstat -pant
iptables -I INPUT -s 198.0.0.0/8 -j DROP
iptables -I INPUT -s 69.0.0.0/8 -j DROP
iptables -I INPUT -s 204.0.0.0/8 -j DROP
iptables -I INPUT -s 46.0.0.0/8 -j DROP
iptables -I OUTPUT -s 198.0.0.0/8 -j DROP
iptables -I OUTPUT -s 69.0.0.0/8 -j DROP
iptables -I OUTPUT -s 204.0.0.0/8 -j DROP
iptables -I OUTPUT -s 46.0.0.0/8 -j DROP
}}}
9. Finally found cron file, which was responsible for that. It used a lib, so this was suspicious
and it recreated itself again and again with differnt pids
{{{
ps -ef | grep -i libudev.so.6
vi crontab
rm /etc/cron.daily/gcc.sh
}}}
10. Restarted by the way again and again in between
Other useful commands:
{{{
who -a
ls -lat
/etc/init.d/collectl start
collectl -p /var/log/collectl/filename --top
collectl --top
skill -KILL -u <username>
locate acdnfhruvx
}}}