LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-17-2021, 02:52 PM   #1
Jackson111
LQ Newbie
 
Registered: Jul 2019
Posts: 27

Rep: Reputation: Disabled
Hacked or Trojaned?


I was running history on the bash terminal, and found a ton of peculiar text there, mostly html, like:

815 sudo <body class="question-page unified-theme">
816 <header class="top-bar js-top-bar top-bar__network _fixed">
817 </div>
818 <ol class="overflow-x-auto ml-auto -secondary grid ai-center list-reset h100 user-logged-out" role="presentation">
819 your communities </h3>
820 <a href="https://unix.stackexchange.com/users/signup?ssrc=site_switcher&amp;returnurl=https%3a%2f%2funix.stackexchange.com%2fquestions%2f464585%2f umount-target-is-busy" class="login-link js-gps-track" data-gps-track="site_switcher.click({ item_type:10 })">Sign up</a> or <a href="https://unix.stackexchange.com/users/login?ssrc=site_switcher&amp;returnurl=https%3a%2f%2funix.stackexchange.com%2fquestions%2f464585%2fu mount-target-is-busy" class="login-link js-gps-track" data-gps-track="site_switcher.click({ item_type:11 })">log in</a> to customize your list. </div>
821 </ol>
822 </header>
823 StackExchange.scrollPadding.setPaddingTop(50, 10); </script>


etc. etc.

Seems as if some scripts were executed without me knowing.

I quickly ran chkrootkit, and it said there was infection with Linux/XOR.DDoS on the first run.

Searching for Linux.Xor.DDoS ... INFECTED: Possible Malicious Linux.Xor.DDoS installed

I became suspicious of a gaming server I ran continuously on this machine, especially as some fun freebies had been installed recently. Hence, I decided to stop it. A little later, on the second and third run, there were no infections reported. My auth.log files look fine. Clamscan was running for over three hours and found nothing.

I restarted the gaming server. Lo and behold, chkrootkit now says there is XOR present.

I am not so much into Linux virology, but would be grateful if somebody could explain what is going on. I am under impression that some of the freebie plugs are calling home.

BTW, I was assessing damage, and found none.
 
Old 04-17-2021, 03:21 PM   #2
teckk
LQ Guru
 
Registered: Oct 2004
Distribution: Arch
Posts: 5,142
Blog Entries: 6

Rep: Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829Reputation: 1829
Looks like you pasted a html page into the terminal.

For example, the top part of the source for this page you are looking at.
Code:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<base href="https://www.linuxquestions.org/questions/" /><!--[if IE]></base><![endif]-->
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />
<meta name="keywords" content="Hacked,Trojaned, Hacked or Trojaned?, Linux,how to,tutorial,operating system,linux,red hat,mandrake,security,linux help,installation,question,forum" />
<meta name="description" content="I was running history on the bash terminal, and found a ton of peculiar text there, mostly html, like: 815 sudo &lt;body class=&quot;question-page" />

<style type="text/css" id="vbulletin_css">
/**
* vBulletin 3.8.10 Beta 1 CSS
* Style: 'LQ Style - child of default'; Style ID: 7
*/
body
{
	background: #FFFFFF;
	color: #000000;
	font: 10pt Verdana,Arial,Helvetica,sans-serif;
	margin: 5px 10px 10px 10px;
	padding: 0px;
}
a:link, body_alink
{
	color: #22229C;
}
Paste that in to your terminal, then look at your bash history.
 
1 members found this post helpful.
Old 04-17-2021, 03:30 PM   #3
Jackson111
LQ Newbie
 
Registered: Jul 2019
Posts: 27

Original Poster
Rep: Reputation: Disabled
Thanks for the quick response!

I'd be very happy to learn that this is the case. I wasn't operating this machine most of the time, so the possibility is there. However, why is there XOR infection warning from the chkrootkit only when the game server is running?

Quote:
Originally Posted by teckk View Post
Looks like you pasted a html page into the terminal.

For example, the top part of the source for this page you are looking at.
Code:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<base href="https://www.linuxquestions.org/questions/" /><!--[if IE]></base><![endif]-->
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />
<meta name="keywords" content="Hacked,Trojaned, Hacked or Trojaned?, Linux,how to,tutorial,operating system,linux,red hat,mandrake,security,linux help,installation,question,forum" />
<meta name="description" content="I was running history on the bash terminal, and found a ton of peculiar text there, mostly html, like: 815 sudo &lt;body class=&quot;question-page" />

<style type="text/css" id="vbulletin_css">
/**
* vBulletin 3.8.10 Beta 1 CSS
* Style: 'LQ Style - child of default'; Style ID: 7
*/
body
{
	background: #FFFFFF;
	color: #000000;
	font: 10pt Verdana,Arial,Helvetica,sans-serif;
	margin: 5px 10px 10px 10px;
	padding: 0px;
}
a:link, body_alink
{
	color: #22229C;
}
Paste that in to your terminal, then look at your bash history.
 
Old 04-18-2021, 02:24 AM   #4
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,930

Rep: Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321
since you gave no usable info:
look for your game server and Linux.Xor.DDoS on the net, probably it is a false positive.
do not rely on auth.log or similar if your system is infected.
if you are really interested you can boot another OS (from pendrive) and check your system.
 
1 members found this post helpful.
Old 04-18-2021, 05:12 AM   #5
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by Jackson111 View Post
Seems as if some scripts were executed without me knowing.
No.
Your shell does not know how to execute javascript or parse HTML.
What teckk wrote:
Quote:
Originally Posted by teckk View Post
Looks like you pasted a html page into the terminal.
 
1 members found this post helpful.
Old 04-18-2021, 09:18 AM   #6
Jackson111
LQ Newbie
 
Registered: Jul 2019
Posts: 27

Original Poster
Rep: Reputation: Disabled
Thanks for the replies, I surely learned a lot, and I am now slightly less concerned. Luckily, I don't see strange things going on along with chkrootkit reporting infection too often, so I am not too experienced with such situations.

Quote:
Originally Posted by ondoho View Post
No.
Your shell does not know how to execute javascript or parse HTML.
What teckk wrote:
I had a quick look at the abilities of that XOR. Seems like it is quite powerful, often embedded into binaries, and able operate from there.
 
Old 04-19-2021, 11:54 AM   #7
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by Jackson111 View Post
I quickly ran chkrootkit, and it said there was infection with Linux/XOR.DDoS on the first run.

Searching for Linux.Xor.DDoS ... INFECTED: Possible Malicious Linux.Xor.DDoS installed
I'm sure chkrootkit will tell you more than that.
What?

And again, this most likely has nothing to do with the rest of your first post:

Quote:
Originally Posted by Jackson111 View Post
I was running history on the bash terminal, and found a ton of peculiar text there, mostly html, like:

815 sudo <body class="question-page unified-theme">
816 <header class="top-bar js-top-bar top-bar__network _fixed">
817 </div>
818 <ol class="overflow-x-auto ml-auto -secondary grid ai-center list-reset h100 user-logged-out" role="presentation">
819 your communities </h3>
820 <a href="https://unix.stackexchange.com/users/signup?ssrc=site_switcher&amp;returnurl=https%3a%2f%2funix.stackexchange.com%2fquestions%2f464585%2f umount-target-is-busy" class="login-link js-gps-track" data-gps-track="site_switcher.click({ item_type:10 })">Sign up</a> or <a href="https://unix.stackexchange.com/users/login?ssrc=site_switcher&amp;returnurl=https%3a%2f%2funix.stackexchange.com%2fquestions%2f464585%2fu mount-target-is-busy" class="login-link js-gps-track" data-gps-track="site_switcher.click({ item_type:11 })">log in</a> to customize your list. </div>
821 </ol>
822 </header>
823 StackExchange.scrollPadding.setPaddingTop(50, 10); </script>


etc. etc.

Seems as if some scripts were executed without me knowing.
Quote:
Originally Posted by Jackson111 View Post
I became suspicious of a gaming server I ran continuously on this machine, especially as some fun freebies had been installed recently. Hence, I decided to stop it. A little later, on the second and third run, there were no infections reported. My auth.log files look fine. Clamscan was running for over three hours and found nothing.

I restarted the gaming server. Lo and behold, chkrootkit now says there is XOR present.

I am not so much into Linux virology, but would be grateful if somebody could explain what is going on. I am under impression that some of the freebie plugs are calling home.

BTW, I was assessing damage, and found none.
What have you done to get a clearer picture? Have you searched?
https://security.stackexchange.com/q...ddos-installed
https://www.linuxquestions.org/quest...ve-4175671870/
etc.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] My network is hacked for sure. I want to reinstall but it will be hacked again. MsRefusenik Linux - Security 19 10-18-2010 05:02 PM
LXer: Trojaned App Demonstrates Need for Better Practices, Not More FUD LXer Syndicated Linux News 3 06-15-2010 07:05 AM
OpenSSH package trojaned CARTMAN Linux - Security 0 08-01-2002 09:54 AM
Western Union Web Site Hacked - Credit Card Numbers Stolen! jeremy General 0 09-10-2000 02:28 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:44 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration