LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-22-2015, 01:23 AM   #1
rdx
Member
 
Registered: Apr 2007
Location: Dallas
Distribution: Slackware64 14.2
Posts: 283

Rep: Reputation: 25
Is my Apache HTTP server infected?


I installed a Fire Fox browser on Win 7 and it got infected with malware from kat.cr when I tried to download a torrent. This malware ONLY AFFECTS Fire Fox, Chrome works fine and is not affected. I have completely removed and reinstalled FireFox but clearly some files are not being removed because the new invocation already has ghostery installed and it immediately goes back to the last site. That's where Linux gets involved.

The site that seems to trigger the malware to start all sorts of popups and ads is my local server running Linux Slackware 11 and an Apache HTTP server. I can go to other site with Fire Fox (e.g., google.com) without triggering the infection but when I go to my local server stuff starts happening. I have run 4 different virus/malware scanners on this Win 7 machine, all of which find a couple of dozen files that they remove but none of that gets at the seed that reloads all those. One thing it does is reset the "home page" on FireFox. It even does it while I'm on that page setting it, I set it resets.

I'm not sure but I think the same malware tried to attack FireFox on my Slackware64 14.1 machine but it doesn't take there. I closed the browser and reopened it and no more problem. None of these problems show up with the other browsers on Slack 14.1 either. It's only the FireFox on the windows machine, and esp when connecting to the Slack 11 server.

oops, an ad just popped up on the wikipedia site so it's not just my local server.

Last edited by rdx; 10-22-2015 at 01:41 AM. Reason: added
 
Old 10-22-2015, 07:13 AM   #2
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Create a new Firefox profile and check using the new profile.

Let us know.
 
Old 10-22-2015, 07:19 AM   #3
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,661

Rep: Reputation: Disabled
Is your server accessible from internet? If it is the web pages it serves may be hacked.
 
Old 10-22-2015, 02:05 PM   #4
rdx
Member
 
Registered: Apr 2007
Location: Dallas
Distribution: Slackware64 14.2
Posts: 283

Original Poster
Rep: Reputation: 25
Quote:
Originally Posted by Emerson View Post
Is your server accessible from internet? If it is the web pages it serves may be hacked.
Yes, it must be accessible because my logs show I was attacked like 200k times last year in attempted breakins. Based on the dictionary of user names that were thrown at it I would say that attack came from Italy. Sometimes I had as many as 12 attempts/second of guessing the root password (ssh). The thing is, I don't see any changes to the web pages. They're simple, < 100 lines, mostly menus which select and run .php routines (small simple ones which I wrote). If web pages are hacked, what would it look like? Added links, right?
 
Old 10-22-2015, 02:24 PM   #5
rdx
Member
 
Registered: Apr 2007
Location: Dallas
Distribution: Slackware64 14.2
Posts: 283

Original Poster
Rep: Reputation: 25
Quote:
Originally Posted by Habitual View Post
Create a new Firefox profile and check using the new profile.

Let us know.
I'm not sure what you mean by "create a new Firefox profile." However I did login as a different user and Firefox seems to be clean for that user. So it seems it is tied to the user and not the browser or the server? That doesn't sound so bad then.
 
Old 10-22-2015, 03:43 PM   #6
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
terminal >
Code:
firefox -ProfileManager
but using another user's environment/login/firefox is just as well.

You could clean out cache from the "infected" user's firefox?

Quote:
Originally Posted by rdx View Post
That doesn't sound so bad then.
Not at all.
 
2 members found this post helpful.
Old 10-22-2015, 04:20 PM   #7
rdx
Member
 
Registered: Apr 2007
Location: Dallas
Distribution: Slackware64 14.2
Posts: 283

Original Poster
Rep: Reputation: 25
Deleting the Mozilla profile seems to have fixed it. Thanks.
 
Old 10-22-2015, 04:36 PM   #8
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Glad it worked out!
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Apache HTTP Server Adds HTTP/2 Support for Speed and Security LXer Syndicated Linux News 0 10-19-2015 11:21 PM
Apache HTTP Server gjagadish Linux - Software 5 12-18-2006 02:39 PM
Apache HTTP Server gjagadish Programming 1 08-10-2006 09:10 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:32 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration