[volunteergrid2-l] my server has been hacked

sabotrax at gmail.com sabotrax at gmail.com
Wed Mar 7 22:39:50 UTC 2012


i really don't know. the system has been a fully patched ubuntu 11.04.
external services were tahoe, ssh, postfix, apache, tor, polipo, f*ex,
subsonic and ownloud (under apache).
all but the last two were ubuntu packages, so i assume they were ok.
no daemon was configured unsafe (like fancy apache modules or such).
subsonic (a music streaming server) did run with non-root privs.
owncloud (a private cloud software) is implemented as a php script and
runs as the apache user (www-data).
the password of my user has been a 10 chars long semi random password
created by 'apg'. it looked something like 'EljadWole5'. i had the
password for about a year which i think is too long.
yesterday i installed debian 6.0.4 and i like to keep it running with
less packages and services. i secured ssh with one time passwords
(opie) now.


2012/3/7 Brad Rupp <bradrupp at gmail.com>:
> I would be curious to know if you figured out how they hacked you.  That is
> good information for all of us to know to make sure we don't have similar
> holes.
>
> Brad
>
>
> On 3/6/2012 8:55 AM, sabotrax at gmail.com wrote:
>>
>> Hi all,
>> it seems as if my server who is running tahoe has been hacked.
>> i hate to say this, but i think the introducer furl has to be changed
>> again.
>>
>> i just looked around my system when i saw a new dir "test" under
>> "/home" that has been created on 2012/02/21.
>> i then did:
>>
>> root at foo:/home# lsof |grep test
>> bash       1458       test  cwd       DIR               0,18      460
>>             6108855 /run/shm/   /   /bot
>> bash       1458       test  rtd       DIR                8,1     4096
>>                   2 /
>> bash       1458       test  txt       REG               0,18   492135
>>             6108126 /run/shm/   /   /bot/bash
>> bash       1458       test  mem       REG                8,1    79712
>>            14811193 /lib32/libresolv-2.13.so
>> bash       1458       test  mem       REG                8,1    46736
>>            14811192 /lib32/libnss_files-2.13.so
>> bash       1458       test  mem       REG                8,1  1532104
>>            14811189 /lib32/libc-2.13.so
>> bash       1458       test  mem       REG                8,1    22092
>>            14811194 /lib32/libnss_dns-2.13.so
>> bash       1458       test  mem       REG                8,1   126152
>>            14811196 /lib32/ld-2.13.so
>> bash       1458       test    0w      REG               0,18  2153806
>>             6108891 /run/shm/   /   /bot/LinkEvents
>> bash       1458       test    1u     sock                0,7      0t0
>>            85480587 can't identify protocol
>> bash       1458       test    2u     sock                0,7      0t0
>>            85479769 can't identify protocol
>> bash       1458       test    3u     IPv4            6108142      0t0
>>                 UDP *:49486
>> bash       1458       test    4u     sock                0,7      0t0
>>            85481277 can't identify protocol
>> bash       1458       test    5u     sock                0,7      0t0
>>            85698092 can't identify protocol
>> bash       1458       test    6u     sock                0,7      0t0
>>            85498612 can't identify protocol
>> bash       1458       test    7u     sock                0,7      0t0
>>            85576571 can't identify protocol
>> bash       1458       test    8u     sock                0,7      0t0
>>            86667704 can't identify protocol
>> bash       1458       test    9u     sock                0,7      0t0
>>            86667741 can't identify protocol
>> bash       1458       test   10u     sock                0,7      0t0
>>            86669526 can't identify protocol
>> bash       1458       test   11u     sock                0,7      0t0
>>            86669303 can't identify protocol
>> bash       1458       test   12u     sock                0,7      0t0
>>            86671788 can't identify protocol
>> bash       1458       test   13u     sock                0,7      0t0
>>            86670345 can't identify protocol
>> bash       1458       test   14u     IPv4           89167118      0t0
>>                 TCP foo.cyberdeck.null:38455->161.53.178.240:ircd
>> (SYN_SENT)
>> bash       1458       test   15u     sock                0,7      0t0
>>            86671794 can't identify protocol
>> bash       1458       test   16u     sock                0,7      0t0
>>            86707925 can't identify protocol
>> bash       1458       test   17u     sock                0,7      0t0
>>            87574595 can't identify protocol
>> bash       1458       test   18u     IPv4           89167113      0t0
>>                 TCP
>> foo.cyberdeck.null:49523->173.245.201.28:afs3-fileserver (SYN_SENT)
>> root at foo:/home# halt
>> W: molly-guard: SSH session detected!
>> Please type in hostname of the machine to halt: foo
>>
>> An alle Benutzer verteilte Nachricht von undo at foo
>>         (/dev/pts/0) um 16:24 ...
>>
>> Das System wird sich JETZT zum Anhalten herunterfahren!
>>
>> ---
>>
>> looks like my box has been a proud member of some botnet for the last two
>> weeks.
>> atm i really don't know how this could have happened. i just wanted to
>> tell you guys as fast as possible.
>>
>> greetings,
>> marcus
>>
> _______________________________________________
> volunteergrid2-l mailing list
> volunteergrid2-l at tahoe-lafs.org
> http://tahoe-lafs.org/cgi-bin/mailman/listinfo/volunteergrid2-l
> http://bigpig.org/twiki/bin/view/Main/WebHome



-- 
Give us this day our garlic bread and lead us not into vegetarianism
but deliver us some pizza.


More information about the volunteergrid2-l mailing list