LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-17-2006, 11:09 AM   #1
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Rep: Reputation: 15
Spam sent from my host


I got an email today from my provider saying they had gotten 5 complaints about spam coming from my system. Taking a look at the headers, it is indeed coming from my system.

Code:
Received: from unknown (HELO server1.berzerker-soft.com) ([65.98.84.210])
          (envelope-sender <apache@berzerker-soft.com>)
          by mta8 (qmail-ldap-1.03) with SMTP
          for <mp128@mail.telepac.pt>; 15 Jan 2006 22:41:14 -0000
Received: by server1.berzerker-soft.com (Postfix, from userid 48)
userid 48 is the apache user.


Given the above headers, it looks like its coming from my Apache server.

I host a handful of friend's websites, who mostly use PHPNuke. I don't want to have to shut Apache down, but I don't want anymore spam to go through my system.

Anyone have any suggestions on troubleshooting this? Any other suggestions?

Thanks
 
Old 01-17-2006, 12:16 PM   #2
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Original Poster
Rep: Reputation: 15
I noticed something weird. I shut down apache, and the following entry was still there (ps -aux | grep apache):

Code:
apache    4369  0.0  0.0  2456  660 ?        S    Jan16   0:11 /usr/sbin/apache                                                                                                                                                                                                                        ? ArDaN
I kill that process, and a coupld of seconds later, its running again...
 
Old 01-17-2006, 12:19 PM   #3
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Original Poster
Rep: Reputation: 15
and the funny thing is, the file "/usr/sbin/apache" doesn't exist...
 
Old 01-17-2006, 12:22 PM   #4
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,632
Blog Entries: 4

Rep: Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931
Exclamation

Take .. that .. system .. off .. the .. network .. Now!
 
Old 01-17-2006, 12:24 PM   #5
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Original Poster
Rep: Reputation: 15
I'd love to... Its a dedicated server.

Can you please explain what it means? What might have gone wrong?

Thanks.
 
Old 01-17-2006, 01:12 PM   #6
gilead
Senior Member
 
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141

Rep: Reputation: 168Reputation: 168
Search Google for phpnuke vulnerabilities - there are plenty of hits. You probably need to upgrade/patch your php stuff.

It sounds like something foreign is already running on your system. I'd be taking the machine off the network, going through logs, looking for unusual files and checking that system binaries haven't been changed (do you run tripwire or something like it?). Dedicated server or not, you need to ensure the data you're hosting isn't put at further risk.
 
Old 01-17-2006, 01:17 PM   #7
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Original Poster
Rep: Reputation: 15
Thanks Steve,

I don't have tripwire installed. I think I'm going to get a new server and shut the old one down. I just don't want to make the same mistakes the next time and be in the same boat.
 
Old 01-17-2006, 01:22 PM   #8
gilead
Senior Member
 
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141

Rep: Reputation: 168Reputation: 168
There's an article at http://phpnuke.org/modules.php?name=...-php-nuke.html that might be helpful. The first page is a bit vague, but after that it describes the common vulnerabilities in pretty good detail. There's also some stuff at http://www.nukecops.com/article46.html.
 
Old 01-17-2006, 01:32 PM   #9
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Original Poster
Rep: Reputation: 15
Thanks again Steve,

Those sites are helpful. I'll take a look at them.
 
Old 01-17-2006, 01:46 PM   #10
gilead
Senior Member
 
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141

Rep: Reputation: 168Reputation: 168
No problem - good luck
 
Old 01-17-2006, 10:51 PM   #11
pk21
Member
 
Registered: Jun 2002
Location: Netherlands - Amsterdam
Distribution: RedHat 9
Posts: 549

Rep: Reputation: 30
did you check your apache access log?
It will probably contain the script that is being abused if you search for email addresses in that log. Just search for @
 
Old 01-17-2006, 10:59 PM   #12
erimar77
Member
 
Registered: Jan 2006
Posts: 76

Rep: Reputation: 15
more than likely, one of the php sites got hacked into. i would check those sites to see if there is any visible tampering.
 
Old 01-18-2006, 04:50 AM   #13
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Original Poster
Rep: Reputation: 15
Well, I was able to kill that suspicious process by creating a new user for apache, and deleting the apache user, then killing the process. None of the PHP sites have any visible tampering that I can tell. But as you said, I'm pretty sure it was one of the PHP sites that did indeed get hacked.
 
Old 01-18-2006, 07:39 AM   #14
vbfischer
Member
 
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33

Original Poster
Rep: Reputation: 15
I was rumaging around my server, and found the following files in the tmp folder:

dc - a binary file
dc.txt - a text file which appears to be a perl script, providing a back door into my system.

Header had this information:
#IRAN HACKERS SABOTAGE Connect Back Shell
#code by:LorD
#We Are :LorD-C0d3r-NT
#Email:LorD@ihsteam.com
#
#lord@SlackwareLinux:/home/programing$ perl dc.pl
#--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--

and a folder called "den" which contained a bum of files, on looking like it was a list of email addresses that failed, and ok.
 
Old 01-18-2006, 01:02 PM   #15
gilead
Senior Member
 
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141

Rep: Reputation: 168Reputation: 168
They've got their own web site at ihsteam.net. I won't post the whole URL since it's easy enough to find. It looks like they have exploits available for download - not my kind of place really.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
connecting a host to internet thru another host (both running suse9.3) rcbell Linux - Networking 1 12-17-2005 05:35 PM
Resolving <www.some remote host>.... failed: Host not found. koodoo Linux - Newbie 2 06-27-2005 08:48 AM
procmail and spam -- do not send out of office auto replay to spam draix Linux - Software 0 12-30-2004 08:35 AM
What other anti-spam for Linux that can be used, other than Spam assassin? johnportiz Linux - Software 6 01-27-2004 03:17 AM
Unknown Host <Linuxmachinename> / Unable to ping by host name nishi_k_79 Linux - Networking 4 11-01-2003 01:24 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:36 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration