Some of them yes, some of them no. Almost every server has the only
nginx installed without PHP or Perl backend with the simple location /
that just serves static files.perl script was launched from ssh. I am
sure. How could you describe then such environ file of the perl PID?
Where it is clearly mentioned that command was launched throgh ssh on
SSH port from a concrete IP that does not belong to me .  -j DROP rule
on 22 port prevented that script to appear again but i`s not a
solution.
On Thu, Dec 29, 2011 at 8:19 PM, Todd Wheeler <[email protected]> wrote:
> Any chance you have a web server on these boxes? Anything that allows file 
> upload? A very common attack is to upload a .pl file through a form, and if 
> that form is sending to a path in your web root, that .pl file basically 
> becomes executable via a URL. Once it's run, it can do just about anything 
> your web server process can do, and from there local exploits are possible. 
> This includes running standalone SSH daemons, etc.
>
> I'm with everyone else - if you haven't cut them to the outside world 
> already, you should.
>
>
> On Dec 29, 2011, at 10:56 AM, Taz wrote:
>
>>  I use fail2ban but the fact is there absolutly no records of
>> connections in auth.logI am sure ssh is used because after i blocked
>> ssh port at all "perl" process does not start anymore.Besides on
>> different machines i use different ports and in all environ files of
>> the perl process in /proc there is a right port written. It shoud be
>> also mentioned that SSLVL variable is always 1, while i think it
>> should be 2.
>> On Thu, Dec 29, 2011 at 7:47 PM, Taz <[email protected]> wrote:
>>> of course, i've double changed all password and regenerated ssh keys.
>>>
>>> On Thu, Dec 29, 2011 at 7:44 PM, Taz <[email protected]> wrote:
>>>> http://security.stackexchange.com/questions/10202/perl-script-rootkit
>>>>
>>>> here it is, all the details. please check out
>>>>
>>>> On Thu, Dec 29, 2011 at 7:31 PM, Kees de Jong <[email protected]> wrote:
>>>>> If you are absolutely sure that they gained root access then there is no
>>>>> other alternative then to kill the internet on those machines.
>>>>> And then you should back up all the data you want to preserve so that you
>>>>> can reinstall those machines safely. There is no telling if they installed
>>>>> another SSH server or other nasty things like rootkits.
>>>>> Most attackers install their own SSH server so that any changes your make 
>>>>> to
>>>>> patch your security holes aren't putting them out of business.
>>>>> Unless you have aide installed and made regular checksums of all the files
>>>>> and configs then you have no idea if anything is changed since the attack.
>>>>> You can also try rkhunter and chkrootkit to find any rootkits on your
>>>>> system, but they aren't conclusive.
>>>>>
>>>>> The only way to be sure that you are in the clear is a total new start on
>>>>> all the affected machines.
>>>>>
>>>>>
>>>>> PS: We all got it now, fail2ban is a great tool ;-)
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> On Thu, Dec 29, 2011 at 15:04, Taz <[email protected]> wrote:
>>>>>>
>>>>>> Hello, we've got various debian servers, about 15, with different
>>>>>> versions. All of them have been attacked today and granted root
>>>>>> access.
>>>>>> Can anybody help? We can give ssh access to attacked machine, it seems
>>>>>> to be serious ssh vulnerability.
>>>>>>
>>>>>> How can i contact openssh mnt?
>>>>>>
>>>>>> Thank you.
>>>>>>
>>>>>>
>>>>>> --
>>>>>> To UNSUBSCRIBE, email to [email protected]
>>>>>> with a subject of "unsubscribe". Trouble? Contact
>>>>>> [email protected]
>>>>>> Archive:
>>>>>> http://lists.debian.org/CA+0W4N=at0esj+y3d8drzw8u+s6tcr6bcuha+w+u5rl-80v...@mail.gmail.com
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Met vriendelijke groet,
>>>>> Kees de Jong
>>>>>
>>>>>
>>>>> De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is
>>>>> uitsluitend bestemd voor de geadresseerde(n).
>>>>> Indien u dit bericht onterecht ontvangt, wordt u verzocht de inhoud niet 
>>>>> te
>>>>> gebruiken en de afzender direct te informeren door het bericht te
>>>>> retourneren.
>>>>> --
>>>>> The information contained in this message may be confidential and is
>>>>> intended to be exclusively for the addressee(s).
>>>>> Should you receive this message unintentionally, please do not use the
>>>>> contents herein and notify the sender immediately by return e-mail.
>>>>>
>>
>>
>> --
>> To UNSUBSCRIBE, email to [email protected]
>> with a subject of "unsubscribe". Trouble? Contact [email protected]
>> Archive: 
>> http://lists.debian.org/CA+0W4Nmh1iUJ3u=2uxp0hhzqw5-j03fdsoch1w1adosty3c...@mail.gmail.com
>>
>
>


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: 
http://lists.debian.org/CA+0W4N=q1nu80-du-ak7owwuytqw1ygv3k6ycsxjmrdsccs...@mail.gmail.com

Reply via email to