Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
|
01-17-2006, 11:09 AM
|
#1
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Rep:
|
Spam sent from my host
I got an email today from my provider saying they had gotten 5 complaints about spam coming from my system. Taking a look at the headers, it is indeed coming from my system.
Code:
Received: from unknown (HELO server1.berzerker-soft.com) ([65.98.84.210])
(envelope-sender <apache@berzerker-soft.com>)
by mta8 (qmail-ldap-1.03) with SMTP
for <mp128@mail.telepac.pt>; 15 Jan 2006 22:41:14 -0000
Received: by server1.berzerker-soft.com (Postfix, from userid 48)
userid 48 is the apache user.
Given the above headers, it looks like its coming from my Apache server.
I host a handful of friend's websites, who mostly use PHPNuke. I don't want to have to shut Apache down, but I don't want anymore spam to go through my system.
Anyone have any suggestions on troubleshooting this? Any other suggestions?
Thanks
|
|
|
01-17-2006, 12:16 PM
|
#2
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
I noticed something weird. I shut down apache, and the following entry was still there (ps -aux | grep apache):
Code:
apache 4369 0.0 0.0 2456 660 ? S Jan16 0:11 /usr/sbin/apache ? ArDaN
I kill that process, and a coupld of seconds later, its running again...
|
|
|
01-17-2006, 12:19 PM
|
#3
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
and the funny thing is, the file "/usr/sbin/apache" doesn't exist...
|
|
|
01-17-2006, 12:22 PM
|
#4
|
LQ Guru
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 11,194
|
 Take .. that .. system .. off .. the .. network .. Now! 
|
|
|
01-17-2006, 12:24 PM
|
#5
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
I'd love to... Its a dedicated server.
Can you please explain what it means? What might have gone wrong?
Thanks.
|
|
|
01-17-2006, 01:12 PM
|
#6
|
Senior Member
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141
Rep: 
|
Search Google for phpnuke vulnerabilities - there are plenty of hits. You probably need to upgrade/patch your php stuff.
It sounds like something foreign is already running on your system. I'd be taking the machine off the network, going through logs, looking for unusual files and checking that system binaries haven't been changed (do you run tripwire or something like it?). Dedicated server or not, you need to ensure the data you're hosting isn't put at further risk.
|
|
|
01-17-2006, 01:17 PM
|
#7
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
Thanks Steve,
I don't have tripwire installed. I think I'm going to get a new server and shut the old one down. I just don't want to make the same mistakes the next time and be in the same boat.
|
|
|
01-17-2006, 01:32 PM
|
#9
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
Thanks again Steve,
Those sites are helpful. I'll take a look at them.
|
|
|
01-17-2006, 01:46 PM
|
#10
|
Senior Member
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141
Rep: 
|
No problem - good luck 
|
|
|
01-17-2006, 10:51 PM
|
#11
|
Member
Registered: Jun 2002
Location: Netherlands - Amsterdam
Distribution: RedHat 9
Posts: 549
Rep:
|
did you check your apache access log?
It will probably contain the script that is being abused if you search for email addresses in that log. Just search for @
|
|
|
01-17-2006, 10:59 PM
|
#12
|
Member
Registered: Jan 2006
Posts: 76
Rep:
|
more than likely, one of the php sites got hacked into. i would check those sites to see if there is any visible tampering.
|
|
|
01-18-2006, 04:50 AM
|
#13
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
Well, I was able to kill that suspicious process by creating a new user for apache, and deleting the apache user, then killing the process. None of the PHP sites have any visible tampering that I can tell. But as you said, I'm pretty sure it was one of the PHP sites that did indeed get hacked.
|
|
|
01-18-2006, 07:39 AM
|
#14
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
I was rumaging around my server, and found the following files in the tmp folder:
dc - a binary file
dc.txt - a text file which appears to be a perl script, providing a back door into my system.
Header had this information:
#IRAN HACKERS SABOTAGE Connect Back Shell
#code by:LorD
#We Are :LorD-C0d3r-NT
#Email:LorD@ihsteam.com
#
#lord@SlackwareLinux:/home/programing$ perl dc.pl
#--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
and a folder called "den" which contained a bum of files, on looking like it was a list of email addresses that failed, and ok.
|
|
|
01-18-2006, 01:02 PM
|
#15
|
Senior Member
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141
Rep: 
|
They've got their own web site at ihsteam.net. I won't post the whole URL since it's easy enough to find. It looks like they have exploits available for download - not my kind of place really.
|
|
|
All times are GMT -5. The time now is 12:40 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|