Hi there,

On Thu, 15 Jun 2017, Michael D. Setzer II wrote:

... seeing a message from systemctl --status=failed that DbSercuritySpt
was failing. It is some that in /etc/init.d but just was a shell script that run
/tmp/g251 which didn't exist. The was also a selinux and a weird named file
in same directory. A recent build system had none of these files.  The weird
named file, was actually pointing to /usr/bin/samewierdname file that would
be 625900 bytes in size. The name of the file would change, and some
systems had multiple copies of the files, and the would have the current date.
Later I found the crontab had a line that would run a script gcc.sh from the
/etc/cron.hourly folder.

It seems almost certain that you're a victim of malicious activity.  Perhaps
not too surprising in an educational establishment.

... using this process to try to clean the machines, but don't know if there
is a better way, or even if this is really going to complete fix the issue.

Maybe you can get copies of the files and run them by something like Jotti's
Malware Scan:

https://virusscan.jotti.org/

I also noticed that the lsof ps and netstat programs seemed to have been
modififed. rkhunter probable saw that ...

It's just the sort of thing it's looking for. :)

I did this on one system, and it seemed to get rid of the problem, but it has
just been a short time.

Was hoping this list would have the best answers for really fixing
this, or at least pointing me to a resouce that can.

Malicious authors will often use a variety of tricks to achive what's
called "persistence", in other words preventing the legitimate user's
attempts to remove the malicious software from succeeding.  Sometimes
you'll find them all, sometimes not.  If you don't then you will most
likely have to start over.  Maybe not a waste of time as you'll have
learned something about the threat.  Deleting all the files which
happen to be of a certain size seems slightly risky to me.  My view is
that the surest way to fix things is aggressive; wipe discs, complete
re-install from known good original software.

I would want to find out more about the malicious software.  You will
probably be able to find a description of it and what it does from
the scanners listed at jotti.org or similar, and that should lead to
a satisfactory solution which can probably be somewhat automated for
recovery of all your systems.  It should be possible to do something
which will prevent a repeat of the incident, I would want to find how
the malicious software managed to get in, perhaps there's some known
vulnerability, and fix that so it can't happen again.  Perhaps one of
your students is guilty, you might be able to finger the culprit.

--

73,
Ged.

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to