Security Breach Cpanel

Oct 1, 2006

somewhere on my cpanel server a script has been able to be used by a spammer and im now getting tonnes of returned mails from aol etc. 1000's are coming in every hour.

I think i have found the culprit, but i can't be sure. how can i find out for sure which script this was? the email headers dont even show the user from what i can see!

View 6 Replies


ADVERTISEMENT

Security Breach At Steadfast

Jun 17, 2008

I got an email saying that there was a security breach at steadfast. At the same time I got an email saying that my account was suspended because I am sending spam from one of my domains. I NEVER SEND SPAM. I opened a support ticket and they apologized saying it's not my fault and they restored my account. Apparently spam was sent by a php script but they don't want to give me details. The next day they suspended my account again on the same reason.

View 13 Replies View Related

Security Breach On A Server

Dec 17, 2007

I found a random proxy site running out of /var/www/temp. It seems to have been created yesterday, and I found about it via a DMCA notice from the planet. Is this apache's temporary directory? There was even an entry for it in the apache configuration and was running as a perl script out of its own cgi bin. I killed it and chmod'd it to 0. In the future, would setting permissions on this directory to non executable prove to be effective? Any idea if this type of breach is serious enough to warrant an OS reinstall?

View 9 Replies View Related

The Planet Warns Of Security Breach

Oct 16, 2008

I got this email earlier today, surprised to see there isn't already a 10-page thread about it. Did anyone else get this from The Planet?

In the course of the last two days, our Computer Security Incident Response Center team has identified suspicious activity in our customer management portal. Through their vigorous investigation, we have identified what appears to be a security breach that may have affected your customer portal account and server passwords. We have identified the methods by which the systems were compromised and have closed those holes. In addition to those actions, we will be implementing additional security measures to further strengthen the infrastructure and systems.

We are taking this action to alert you to this potential malicious activity. At this juncture, we are aware of only two incidents whereby log-in and server passwords were accessed. Based upon our security review of access logs, we do not believe any credit card information was compromised. We have contacted the authorities and are working with them to identify the perpetrator and to pursue appropriate legal action.

We are taking a proactive approach by contacting you directly, which we believe is the best course of action. We strongly suggest you implement a security best-practices approach by immediately taking four steps to mitigate risk:

1) Change your Orbit log-in passwords immediately and do so again every 60 days.

2) Change your server passwords and do so again every 60 days.

3) Be alert to any suspicious activity on your account.

4) If you suspect any unusual activity, please retain your access logs along with

View 11 Replies View Related

Cpanel Linux Email Breach

Apr 18, 2008

I dont know how but the passwords keeps getting changed on the emails on my cpanel. Its no one who has acess and no files are being delted to the problem is only with the email.

View 6 Replies View Related

Possible Server Breach

Nov 5, 2009

We have found (thanks to CSF warning us) in /tmp 4 suspicious files. One is a perl script (probably a backdoor) and the other 3 files are binaries. They were probably uploaded by some vulnerability a customer's website (now suspended) because they are under his ownership.

The server seems ok, nothing out of the ordinary (the root logins are disabled, we su - from another account).

We have run rkhuner and chkrootkit (fresh installs) and found nothing.

One of the binaries contained this (retrieved with strings): chown root:root /tmp/suid; chmod +s /tmp/suid (suid being one of the other binaries). This /tmp/suid has no suid set and is not under root ownership:

-rw-r--r-- 1 user user 759 Jan 25 2008 dc.pl
-rwxr-xr-x 1 user user 2404 Nov 4 22:10 libno_ex.so.1.0*
-rwxr-xr-x 1 user user 4945 Nov 4 22:10 suid*
-rwxr-xr-x 1 user user 6209 Nov 4 22:10 udev*

dc.pl seems to be from January but it's apparently fake:

# stat dc.pl
File: `dc.pl'
Size: 759 Blocks: 8 IO Block: 4096 regular file
Device: 901h/2305d Inode: 62820496 Links: 1
Access: (0644/-rw-r--r--) Uid: (userid/username) Gid: (userid/username)
Access: 2009-11-05 13:52:37.000000000 +0100
Modify: 2008-01-25 19:49:43.000000000 +0100
Change: 2009-11-05 13:55:41.000000000 +0100

I hope all this means that the command was either not successful or it didn't run in the first place.

The kernel is: 2.6.18-128.1.6.el5PAE
Control Panel: cPanel

View 7 Replies View Related

Server Breach - One Time Admin

Mar 4, 2008

we have a server that was breeched and is being used to send ddos attacks to another website and we need to stop it permanently and secure our server to avoid it from happening again.

My tech has already been able to track down the bot/script that was sending it and seemed to stop it for about a week, but they have gained access to the server again.

He is not an expert at security issues so I'm looking to hire someone for a one time job to correct this issue.

Can someone offer me some referrals of someone to take care of this. Please do not recommend Rack911 as I waited nearly a week for their assistance and had no luck.

View 6 Replies View Related

WHMCS Breach - Some 3.5.1 Downloads Were Compromised

Jan 8, 2008

I just received a fairly scary WHMCS notice, you can view the details here:

<<please don't paste the file names, there are accounts that may have these on them>>

What are your thoughts on the entire situation? Personally, I'm a tad fearful (luckily, I hadn't upgraded to the next version yet as I was letting the other users play beta-testers) given the fact that there wasn't any versioning / modification 'notification' system in place on their end.

I'm fearing further updates. In essence, my concern is that the WHMCS development team isn't entirely certain how they were backdoored or to what scale they were backdoored.

Are their own billing systems & servers hosted in the same environment, were our billing details also released? etc. I want to know the scale of the attack.

View 14 Replies View Related

Cpanel Hacked :: Your Security...Get DoWn

Feb 25, 2008

When I try to access my CPanel, I get the following error message
r00t-x...here ]

your Security...Get DoWn

sorry ..

YOU ARE OWNED!
#my Email
:: Members::
HaCkeR Al-MaDiNaH~_~eVil CeLL

Is it a problem with my account, or a server problem. Is there anything I can do to prevent this problem? Mods please remove anything which is not as per TOS

View 14 Replies View Related

Cpanel Steps For Security

Jan 24, 2008

I just signed up for a shared hosting plan that uses cpanel and got a simple page up and running with no problems. I need to know if there are any steps I need to take as far as security. I have read info about password protecting directories but I'm not sure if that needs to be done on directories that are already there like /etc /mail /accesslogs or just ones that I create like /myimages for example.

I don't have visitors yet and don't think I will for awhile but would still like to take all precautions early and get them out of the way.

View 4 Replies View Related

Stop Cpanel Security Warning

May 10, 2007

How do I stop the common cpanel/whm "domain mismatch" security warning popup for good WITHOUT the need to install a server hostname certificate and access through that.

Is there a way to save the cert in the browser? I could not find that option and I am using Firefox 2.

View 1 Replies View Related

Phpmyadmin Security Issue, How To Upgrade Under Cpanel

May 8, 2007

I've noticed our cpanel still uses phpmyadmin 2.9.0.2 but there is a serious xss issue in versions up to 2.10.0

How can I install the new 2.10.1 around cpanel without it being overwritten?

[url]

View 3 Replies View Related

7 Security And Settings Questions (cpanel/WHM) Server

Aug 30, 2007

Just have some questions regarding server settings and security

1) What will happen if
Open_basedir in php.ini is changed to
Open_basedir = /home:/tmp
?

2) What will happen if all hosted users in passwd file are set to /sbin/nologin ???
Dose it effect running the web site?

What are the effects if
Sync if set to /sbin/nologin default is /bin/sync
shutdown if set to /sbin/nologin default is /sbin/shutdown
halt if set to /sbin/nologin default is /sbin/halt
news if set to /sbin/nologin default is empty
netdump if set to /sbin/nologin default is /bin/bash
Mysql if set to /sbin/nologin default is /bin/bash
mailman if set to /sbin/nologin default is /bin/bash
cpanel if set to /sbin/nologin default is /bin/bash

3) How to make /bin/bash in passwd file is the default path for each new user added (automatically) in cpanel/whm server

4) What is the effect if base64_encode and base64_decode if been added in disable functions?

5) How to secure host.conf and nsswitch.conf to prevent DNS lookup poisoning and also provide protection against spoofs?

6) How to secure the system configuration file sysctl.conf to prevent the TCP/IP stack from syn-flood attacks?

7) What is ClamAV and how to disable it?

View 2 Replies View Related

Joomla Security / Linux Security

Apr 4, 2008

I run a web hosting company and one of my servers is a LAMP server running CentOs 5. A user of mine has a Joomla installation running to manage his website and he has run into the following problem that I am puzzled by.

When Joomla adds a component or module to itself, or when a user uses the Joomla upload functionality, Joomla will add the new files under the user name "apache". This makes sense as it is the apache service running PHP that is actually creating the files.

However, when he FTP's into the account to modify these files, he doesn't have the appropriate permissions to do so as he doesn't have a root level login, just permissions on his home directory which is the site. Any help would be much appreciated.

Also, does anyone know how to change the owner/group of a directory and all of its sub directories in Linux without changing the actual permissions? I.e. some of the files in the folder have different permissions (0644 as apposed to 0755) than its parent but if I do a top down user/group change on the folder it will change everything in that folder to 0755.

View 10 Replies View Related

CPanel Data Migration And New Server Security Setup

Dec 4, 2008

I just signed up for dedicated server at Softlayer with cPanel, mySQL and CentOS. I'm moving a site that is on a VPS with WHM. I know that cPanel has a transfer site feature.

I was considering hiring a service to migrate my site and to harden my server. Is this necessary or should I simply move it via cPanel? Things are tight and I don't want to incur an unnecessary cost if I don't have to. I defer to the members here at WHT for your recommendations.

View 3 Replies View Related

CPanel "Security Error" IE7

Apr 22, 2008

I've been all over the Net trying to find a solution to the 'mismatched' certificate error when a user tries to access cPanel.

I'm on a VPS and have discovered that if I use [url]that FireFox (bless them) doesn't popup with a warning. It will if I use my Shared IP like [url]

IE7 on the other hand ( may the wrath of Khan be on its head) displays it's egregious Red Seal with a warning that Kafka would have a hard time outdoing.

So here's the question with an IE7 gotcha:

Do I purchase a WildCard cert for "hostname.com" so that when a user tries to access cPanel via my.hostname.com they won't get a warning from IE? I've been all over the M$ IE forum and I couldn't find anyone that has a workaround for a shared SSL. I'm concerned now, that even a WildCard cert won't fix the IE problem.

View 12 Replies View Related

Web Security

Jul 16, 2009

I have regarding hosting/designing my application. Users of my website upload highly sensitive files to the server. I'll use SSL but will that be enough since the files are not encrypted on the server. I tried to encrypt the files but that is adding a huge overhead.

My first question is - is it a good idea to store the files on the server rather than a database? My other question is regarding hosting; I'm thinking of building my own server and host it in a colo. Is colo more secure than dedicated hosting? Currently i'm still in the process of developing my App and my environment is Windows Server 2008/SQL Server 2005.

View 13 Replies View Related

Mod Security

Feb 9, 2007

Is there any problems with having duplicate rules in different files as I have downloaded some rules and am going to make them all into one file to give me the best protection, but this is going to take time and I really need some sort of protection now

View 2 Replies View Related

Security

Aug 25, 2007

after install ConfigServer Firewall i get the following ...

ConfigServer Security & Firewall - csf v2.89 >>
PHP Check >>
Check php for register_globals >>
WARNING >> You should modify the PHP configuration (usually in /usr/local/lib/php.ini) and set:
register_globals = Off

unless it is absolutely necessary as it is seen as a significant security risk

must i modify it?or not? put in ur consideration i tried to download it to modify an error occured!

View 2 Replies View Related

How Much Security

Aug 24, 2007

I am on a shared server account with Lunar Pages basic hosting plan.

The only script file I have up running is db Masters FormM@iler. It runs on Cpanel. I deleted whatever other scripts I could find on my server. The site is just basic html pages with jpgs and a gif.

Is there much else I really need to do to secure the server or is that more in Lunar Pages' hands?

If there is still more I can do to secure the server, and is it a small amount that's easy to do or would it be wise to just hire someone else to put in a few hours making sure everything is truly set up securely?

View 5 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved