Security Incidents mailing list archives
Re: exploit or human
From: Victor Calzado <vcalzado () gmail com>
Date: Thu, 31 Mar 2005 18:14:49 +0200
Hi, Valentin Avram wrote:
Hello. Most of the symptoms you describe and the "sudden" falling of more systems does point to a rootkit that was installed on the first compromised machine (FC2). That machine might have been later used to gain access to the other servers in your network.
Yes, It sounds like a script kiddies compromise with worm infection too.There are groups of Romanian IRC Script Kiddies rooting RedHat 7.3 servers all over the world for quite a long time. Is there any of this RedHat 7.3 server running wu-ftpd ftp server or a web server with https support?
Tools and binaries used by this groups are oftenly infected with RST.b worm, that infects ELF headers in /bin files, Red Hat 7.3 binaries get infected but are still functional but RST.b infection in Fedora led to unstable binaries that always seg fault, so a FedoraThe segfaults when running usual commands (mostly grep, netstat, ps and so on) while some other software runs just fine makes the rootkitexplaination quite certain.
infected system will no longer boot after infection.
Also the failure to restart the server usually is a consequence of that. One way to make that sure is to get the hdd from the possibly compromised machine, put it on an offline system which has rkhunter (or other rootkit-detection software) installed and check it. After the signs you described, it quite very probably you'll find a rootkit. RH's before RHEL are ok (from the stability point of view) as long as you keep the exposed services uptodate (recompilation from source). Don't use the old software they come with, cause you might just open a door to your system.
RedHat 7.3 servers should be replaced or updated.
Kernel error messages may also be a sign of intrusion (local root exploit maybe, that breaks something).
Yes, maybe a malformed or missused ptrace exploit could led to kernel instabillity.
About firewall and passwords, that should have been the first step, before making any server accessible from the Internet. Also, be careful because once any server of yours got compromised, this means the attackers may already have the passwords for most of the users on that system.
It seems that more than one server has been compromised, check every box of the network for intrussion evidences.
You should run any antivirus software, clamav is free software and works fine, and search for worms an viri in linux systems. You should get dd images from at least one of the compromised servers that could help to find out who the intruders are and howAbout the last 7.3 you spoke about, it's posible (if the attackers haven't already got the machine) to see some intrusion trace in the system logs (or ssh and other services).
could them compromise servers.I'm sorry but probably you will find more infected systems all over your network. You will probably need to reinstall every compromised server and any content recovered from an "infected" system should be scanned for viri and checked for rootkits.
Good luck, Victor
Current thread:
- exploit or human Cristian Stanca (Mar 29)
- RE: exploit or human andrew2 (Mar 29)
- Re: exploit or human Kevin Reardon (Mar 30)
- Re: exploit or human Tim (Mar 30)
- Re: exploit or human Valentin Avram (Mar 30)
- Re: exploit or human Victor Calzado (Mar 31)
- Re: exploit or human Eduardo Kienetz (Mar 31)
- Re: exploit or human Juri Haberland (Mar 31)
- Re: exploit or human Victor Calzado (Mar 31)
- Re: exploit or human Ben Nelson (Mar 30)
- RE: exploit or human andrew2 (Mar 29)