WholesaleDialup
Verified User
Today I tried logging into my DA system via Webmin but couldn't authenticate. Bad password etc..
So... Wow! Why couldn't I get in I thought.. I verified my password in my little password keeper app and it was correct. Also tried every other password it could be but.. Pretty odd since my browser remembers the password on my laptop and I never have to enter it if I am logging in from my laptop.
Finally had to assume that I had been hacked and they changed my password. ARRRRGG!!!
Luckily, I have SSH setup with a keypair so I don't need a password when logging in to SSH from my laptop. So, even though they changed the root password, I was still able to log-in as root and passwd to change the password back.
I don't allow root login via SSH without a key.
I don't allow any users SSH access on this server at all, just me.
I am running IP Tables.
So, I am sure I don't run the MOST secure box in the world but I have been at this for a number of years and I think it's pretty well secured. OK, Not Really since they got me!!
So, after changing the password for root to something new, I changed the DA password, my personal user account password and so on.
I started my research by hitting the up arrow and looking at the history and noticed they had run some pretty nasty commands as root. I also pulled the list from /root/.bash_history and here they are for reference:
id
rm -rf *
cd /etc/virtual
ls
exit
cd ..
rm -rf gh
ls -la
passwd
exit
ls -la
rm -rf *
ls -la
id
chmod 777 /home/acleorg756/domains
chmod 777 /home/*/domains/*/public_html
chmod 777 /home/*/domains/*
chmod 777 /home/*
chmod 777 /home/*/domains
passwd
Yikes, one thing I noticed right off is that it clearly shows where they ran passwd and changed my password for root. But when looking in the logs, I can't see any SSH connections except from my IP so I don't think they did it via SSH.
I am guessing they compromised the Joomla 1.5.20 install that lives under the acleorg756 user on this box. Just a guess but after all my research I think it's a pretty good guess.
I don't know what they actually deleted with the rm -rf commands and not sure how to tell.
They CHMOD 777 all the website files which I reset using the DA script that resets the permissions for those.
By the way I suspended the site with Joomla on it.
The reason I think they came through that site is because the first thing they did at the command line is "id" then a little later when they started chmoding the web files, they started with that directory first and I don't think it's a coincidence.
I also saw a FTP daemon exploit that came up on the exact day this started which is Nov 28th. I don't think it's related but I thought I would throw it out there.
So, at this point I am trying to determine what they actually did besides CHMOD my files, delete some files, changed my password and pissed me off.
I am not sure if I can trust the box anymore. I know the easy answer is to wipe it but it's a huge deal for me to do that because of a lack of backups and for other reasons.
If I can reasonably trust it then I really don't want to wipe it.
I am mostly brain dead and blind from looking at logs and forums etc. for the entire day. So, I hope some of this made sense.
I wanted to get this out here for two reasons:
1- So other having a similar issue can use the info to solve their issues.
2- Hoping someone out there will see something or think of something obvious that I haven't. Maybe some opinions on what may have happen etc.
Also, not sure what to do with the Joomla site. I researched vulnerabilities for that version and there was one but I didn't really find much info on it.
Finally, I am concerned that all the web files for 50-80 domains have been all set to 777 since Nov 28th until earlier today when I found and fixed. Was there more damage done through those wide open files?
Geesh, hackers really drive me nuts.. What is the point of this misery they cause..![Confused :confused: :confused:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f615.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
Any help would be appreciated.
So... Wow! Why couldn't I get in I thought.. I verified my password in my little password keeper app and it was correct. Also tried every other password it could be but.. Pretty odd since my browser remembers the password on my laptop and I never have to enter it if I am logging in from my laptop.
Finally had to assume that I had been hacked and they changed my password. ARRRRGG!!!
Luckily, I have SSH setup with a keypair so I don't need a password when logging in to SSH from my laptop. So, even though they changed the root password, I was still able to log-in as root and passwd to change the password back.
I don't allow root login via SSH without a key.
I don't allow any users SSH access on this server at all, just me.
I am running IP Tables.
So, I am sure I don't run the MOST secure box in the world but I have been at this for a number of years and I think it's pretty well secured. OK, Not Really since they got me!!
So, after changing the password for root to something new, I changed the DA password, my personal user account password and so on.
I started my research by hitting the up arrow and looking at the history and noticed they had run some pretty nasty commands as root. I also pulled the list from /root/.bash_history and here they are for reference:
id
rm -rf *
cd /etc/virtual
ls
exit
cd ..
rm -rf gh
ls -la
passwd
exit
ls -la
rm -rf *
ls -la
id
chmod 777 /home/acleorg756/domains
chmod 777 /home/*/domains/*/public_html
chmod 777 /home/*/domains/*
chmod 777 /home/*
chmod 777 /home/*/domains
passwd
Yikes, one thing I noticed right off is that it clearly shows where they ran passwd and changed my password for root. But when looking in the logs, I can't see any SSH connections except from my IP so I don't think they did it via SSH.
I am guessing they compromised the Joomla 1.5.20 install that lives under the acleorg756 user on this box. Just a guess but after all my research I think it's a pretty good guess.
I don't know what they actually deleted with the rm -rf commands and not sure how to tell.
They CHMOD 777 all the website files which I reset using the DA script that resets the permissions for those.
By the way I suspended the site with Joomla on it.
The reason I think they came through that site is because the first thing they did at the command line is "id" then a little later when they started chmoding the web files, they started with that directory first and I don't think it's a coincidence.
I also saw a FTP daemon exploit that came up on the exact day this started which is Nov 28th. I don't think it's related but I thought I would throw it out there.
So, at this point I am trying to determine what they actually did besides CHMOD my files, delete some files, changed my password and pissed me off.
I am not sure if I can trust the box anymore. I know the easy answer is to wipe it but it's a huge deal for me to do that because of a lack of backups and for other reasons.
If I can reasonably trust it then I really don't want to wipe it.
I am mostly brain dead and blind from looking at logs and forums etc. for the entire day. So, I hope some of this made sense.
I wanted to get this out here for two reasons:
1- So other having a similar issue can use the info to solve their issues.
2- Hoping someone out there will see something or think of something obvious that I haven't. Maybe some opinions on what may have happen etc.
Also, not sure what to do with the Joomla site. I researched vulnerabilities for that version and there was one but I didn't really find much info on it.
Finally, I am concerned that all the web files for 50-80 domains have been all set to 777 since Nov 28th until earlier today when I found and fixed. Was there more damage done through those wide open files?
Geesh, hackers really drive me nuts.. What is the point of this misery they cause..
![Confused :confused: :confused:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f615.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
![Eek! :eek: :eek:](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f631.png)
Any help would be appreciated.