LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-04-2014, 03:35 PM   #1
Little Giant
LQ Newbie
 
Registered: Mar 2014
Location: Auckland, NZ
Posts: 5

Rep: Reputation: Disabled
Paypal phishing attack


Hey folks (first time poster!),

One of our VPS's was compromised recently. The attacker uploaded a folder "/de" into the root of a clients site. Basically this was diverting visitors to a dodgy paypal link. I was able to remove all files associated with this attack (I think).

However, Paypal is still alerting us to problem and am getting the following in our access logs...

Code:
66.135.200.200 - - [05/Mar/2014:09:30:45 +1300] "GET /de/?c2NobnVnZ2VsQGtyaW0ucnU= HTTP/1.1" 301 679 "-" "Mozilla/3.0 [en] (compatible; Win98; U)"
66.135.200.200 - - [05/Mar/2014:09:30:45 +1300] "GET /de/?YmFidXNoa2EucnVzc2xhbmRAaGFudXR6LmRl HTTP/1.1" 301 701 "-" "Mozilla/3.0 [en] (compatible; Win98; U)"
66.135.200.200 - - [05/Mar/2014:09:30:45 +1300] "GET /de/?YmFidXNoa2EucnVzc2xhbmRAaGFudXR6LmRl HTTP/1.1" 301 679 "-" "Mozilla/3.0 [en] (compatible; Win98; U)"
208.80.194.127 - - [05/Mar/2014:09:33:50 +1300] "GET /de/?YmFidXNoa2EucnVzc2xhbmRAaGFudXR6LmRl HTTP/1.0" 301 701 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.2)"
208.80.194.127 - - [05/Mar/2014:09:33:51 +1300] "GET /de/?YmFidXNoa2EucnVzc2xhbmRAaGFudXR6LmRl HTTP/1.0" 301 679 "-" "Mozilla/5.0 (Windows NT 5.1; U; en) Opera 8.01"
66.55.29.19 - - [05/Mar/2014:09:54:26 +1300] "GET /de/?YmFidXNoa2EucnVzc2xhbmRAaGFudXR6LmRl HTTP/1.1" 301 701 "-" "curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3"
Can anyone help with where I should be looking if there is something still left on the server? There was one file "1.txt" that was in the vhosts/default folder which was also removed. I checked the remaining files and they seemed untouched.

Thanks heaps.
 
Old 03-04-2014, 04:00 PM   #2
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Welcome to LQ!

Is this site, www.outdoorconcepts.co.nz by any chance?
 
Old 03-04-2014, 04:01 PM   #3
Little Giant
LQ Newbie
 
Registered: Mar 2014
Location: Auckland, NZ
Posts: 5

Original Poster
Rep: Reputation: Disabled
Ahem... yes.
 
Old 03-04-2014, 08:57 PM   #4
Little Giant
LQ Newbie
 
Registered: Mar 2014
Location: Auckland, NZ
Posts: 5

Original Poster
Rep: Reputation: Disabled
You got me all excited there with your quick response Habitual... any further thoughts?
 
Old 03-05-2014, 04:04 AM   #5
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
Well the 301 in your log files would indicated that the GET is being redirected rather than returning a 200 success.

My guess is that you have a rule in .htaccess that redirects any "404" missing pages to the main site or something?

Unfortunately you're going to see these for a while, what you could do is re-create the /de folder and have .htaccess return "404" for any attempted access and hope whoever is trying to access that folder gives up when they get the error message rather than the redirect.

I'd also take a guess that "?YmFidXNoa2EucnVzc2xhbmRAaGFudXR6LmRl" is a password that tells the exploit to spill whatever it has gathered.

Other options include using "fail2ban" with a recipe to detect that particular access and "ban" the relevant IP for a period of time.
 
1 members found this post helpful.
Old 03-05-2014, 08:04 AM   #6
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by Little Giant View Post
There was one file "1.txt" that was in the vhosts/default folder which was also removed.
Where on the filesystem is that exactly?

Outside of the compromised account's /home directory?
 
Old 03-05-2014, 12:52 PM   #7
Little Giant
LQ Newbie
 
Registered: Mar 2014
Location: Auckland, NZ
Posts: 5

Original Poster
Rep: Reputation: Disabled
That's a good idea re: recreating the /de folder

Quote:
Originally Posted by TenTenths View Post
Well the 301 in your log files would indicated that the GET is being redirected rather than returning a 200 success.

My guess is that you have a rule in .htaccess that redirects any "404" missing pages to the main site or something?

Unfortunately you're going to see these for a while, what you could do is re-create the /de folder and have .htaccess return "404" for any attempted access and hope whoever is trying to access that folder gives up when they get the error message rather than the redirect.

I'd also take a guess that "?YmFidXNoa2EucnVzc2xhbmRAaGFudXR6LmRl" is a password that tells the exploit to spill whatever it has gathered.

Other options include using "fail2ban" with a recipe to detect that particular access and "ban" the relevant IP for a period of time.
 
Old 03-05-2014, 12:55 PM   #8
Little Giant
LQ Newbie
 
Registered: Mar 2014
Location: Auckland, NZ
Posts: 5

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Habitual View Post
Where on the filesystem is that exactly?

Outside of the compromised account's /home directory?
Yes, so www/vhosts/default which contains the default Plesk domain files. the clients site being in www/vhosts/mydomain.com
 
Old 03-05-2014, 03:47 PM   #9
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by Little Giant View Post
Yes, so www/vhosts/default which contains the default Plesk domain files. the clients site being in www/vhosts/mydomain.com
You may never find the cause of Paypal's concern.
You should backup anything you consider important.
If vps505.lnx.vps.isx.net.nz was mine, I'd ask the provider to re-image it and start over, after acquiring the backup of the system.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
phishing attack on myserver dinakumar12 Linux - Security 3 01-28-2012 07:31 AM
LXer: Paypal Adds Security To Fight Phishing LXer Syndicated Linux News 0 01-14-2007 06:33 AM
PayPal phishing site! aldimeneira General 6 08-29-2006 08:03 AM
OT: Paypal phishing alert dejavu_01 General 3 09-04-2005 05:17 AM
Linux Phishing Attack Circulates on Net (from e-security) webwolf70 Linux - Security 3 11-22-2004 09:54 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:03 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration