Last night one of our servers was hacked. We shutdown the server instantly as we were aware the hacker was connected to ssh at the time.
There are some things we could have done to prevent the hacker logging into ssh (ie change the port, or not allowing root access from ssh), but there is one major thing we couldnt have stoped - and I'd like to know what it was / how it happened.
Around 30 seconds before the user logged into ssh as root (got the password correct first time), the root password was changed (not by me !).
Now the thing I'd like to know is - how ! how can a user with no ssh access change the root password !
They also have no physical access to the server.
They also dont know the root password (I assume this is the case otherwise they wouldnt have needed to change it before logging in).
The server is running CentOS, php is not in safemode, perl etc is enabled as the default DA install.
We have APF/BFD so its not a brute force attack.
Any ideas ?
Thanks
Tom
There are some things we could have done to prevent the hacker logging into ssh (ie change the port, or not allowing root access from ssh), but there is one major thing we couldnt have stoped - and I'd like to know what it was / how it happened.
Around 30 seconds before the user logged into ssh as root (got the password correct first time), the root password was changed (not by me !).
Now the thing I'd like to know is - how ! how can a user with no ssh access change the root password !
They also have no physical access to the server.
They also dont know the root password (I assume this is the case otherwise they wouldnt have needed to change it before logging in).
The server is running CentOS, php is not in safemode, perl etc is enabled as the default DA install.
We have APF/BFD so its not a brute force attack.
Any ideas ?
Thanks
Tom