ioDaniel
Verified User
Hi
I am a newbie to both DirectAdmin and this forum. My apologies if this is the wrong place to post this.
We have a problem with a hacker (who / they) has infected our nameserver IP with a high volume spam sending trojan - it is participating or facilitating a botnet sending spam or spreading virus/spam trojans and our IP has been blacklisted by Abuseat.
I am trying to clean up and have 3 questions below which will help me resolve this problem.
We are located in Chiang Mai, and we rent rack space in a data center located in Bangkok. Tech Support in Bangkok say they cannot help...so its back to me and my very small team.
We only have access to the server using DirectAdmin.
Abuseat recommend:
First: minimize FTP access. Secure/change all passwords. If you can do your customer uploads some other way, turn off FTP, or prevent FTP from writing directly into the web server's document directory.
Ok we will change passwords...thats easy enough to do (12 character alpha numeric + symbol if possible). I will test this in a few minutes.
But how can I prevent FTP from writing directly into the web servers documents directory?
Second: Find the infection. If it's the second version ("cgi"), you can find it, remove it and kill any running copies.
I will have to download all user sites to my PC and search all of them for any cgi files and open and check - once I find anything, I can search for the process using DirectAdmin and kill.
Third: Configure your system to absolutely prohibit any userid except root or your mail server's userid (often "mailman" or something like that) from getting access to outbound port 25. In this way, even if you do get infected, the spamware can't get email out to the Internet.
The question here is how can I do that with DirectAdmin?
Each user has their own email address...so not so easy to restrict access to Port 25.
Your help and advice genuinely appreciated.
Sincerely
Daniel
Admin IO Wow
I am a newbie to both DirectAdmin and this forum. My apologies if this is the wrong place to post this.
We have a problem with a hacker (who / they) has infected our nameserver IP with a high volume spam sending trojan - it is participating or facilitating a botnet sending spam or spreading virus/spam trojans and our IP has been blacklisted by Abuseat.
I am trying to clean up and have 3 questions below which will help me resolve this problem.
We are located in Chiang Mai, and we rent rack space in a data center located in Bangkok. Tech Support in Bangkok say they cannot help...so its back to me and my very small team.
We only have access to the server using DirectAdmin.
Abuseat recommend:
First: minimize FTP access. Secure/change all passwords. If you can do your customer uploads some other way, turn off FTP, or prevent FTP from writing directly into the web server's document directory.
Ok we will change passwords...thats easy enough to do (12 character alpha numeric + symbol if possible). I will test this in a few minutes.
But how can I prevent FTP from writing directly into the web servers documents directory?
Second: Find the infection. If it's the second version ("cgi"), you can find it, remove it and kill any running copies.
I will have to download all user sites to my PC and search all of them for any cgi files and open and check - once I find anything, I can search for the process using DirectAdmin and kill.
Third: Configure your system to absolutely prohibit any userid except root or your mail server's userid (often "mailman" or something like that) from getting access to outbound port 25. In this way, even if you do get infected, the spamware can't get email out to the Internet.
The question here is how can I do that with DirectAdmin?
Each user has their own email address...so not so easy to restrict access to Port 25.
Your help and advice genuinely appreciated.
Sincerely
Daniel
Admin IO Wow