We are in the process of migrating this forum. A new space will be available soon. We are sorry for the inconvenience.

Slow Server Since "Hacked"


mark123
09-05-2015, 23:36
Server After coming to the locked position 2 times to repeat active not possible.

The server will need to be reinstall, you can get out of ftp backup your rescue.

01daell
09-05-2015, 16:58
OK so last night I left the server in normal mode after getting it out of rescue mode.

This morning I got up to discover that the server had been forced back into rescue mode with an email from OVH saying the server had been hacked and gave me the following information:

Attack detail : 29Kpps/23Mbps
dateTime srcIp:srcPort dstIp:dstPort protocol flags bytes reason
2015.05.09 03:27:43 CEST 94.23.1.219:23962 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:16833 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:27614 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:33071 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:24999 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:49981 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:20219 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:13556 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:24761 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:173 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:54192 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:24809 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:64977 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:47158 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:6659 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:4256 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:1416 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:3214 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:20270 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN
2015.05.09 03:27:43 CEST 94.23.1.219:64379 178.33.200.128:80 TCP SYN 848 ATTACK:TCP_SYN


I am now trying to log in to do a chkroot scan and sort the issue but in the SYS control panel it says /!\ informations_server_status_hackedBlocked next to server status and i can not change the netboot or SSH in etc.

Whats going on???

alvaroag
09-05-2015, 07:53
Try running chkrootkit on your SolusVM Slave:

wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz
tar xfz chkrootkit.tar.gz
cd chkrootkit-0.50
./chkrootkit
A clean system output should look similar to this:

ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `crontab'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not tested
Checking `inetdconf'... not found
Checking `identd'... not found
Checking `init'... not infected
Checking `killall'... not infected
Checking `ldsopreload'... can't exec ./strings-static, not tested
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not infected
Checking `mail'... not infected
Checking `mingetty'... not found
Checking `netstat'... not infected
Checking `named'... not infected
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not tested
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `tcpdump'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `vdir'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'... no suspect files
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while...
/usr/lib/pymodules/python2.7/.path /usr/lib/pymodules/python2.6/.path

Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ****C Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for Showtee... nothing found
Searching for OpticKit... nothing found
Searching for T.R.K... nothing found
Searching for Mithra... nothing found
Searching for LOC rootkit... nothing found
Searching for Romanian rootkit... nothing found
Searching for Suckit rootkit... nothing found
Searching for Volc rootkit... nothing found
Searching for Gold2 rootkit... nothing found
Searching for TC2 Worm default files and dirs... nothing found
Searching for Anonoying rootkit default files and dirs... nothing found
Searching for ZK rootkit default files and dirs... nothing found
Searching for ShKit rootkit default files and dirs... nothing found
Searching for AjaKit rootkit default files and dirs... nothing found
Searching for zaRwT rootkit default files and dirs... nothing found
Searching for Madalin rootkit default files... nothing found
Searching for Fu rootkit default files... nothing found
Searching for ESRK rootkit default files... nothing found
Searching for rootedoor... nothing found
Searching for ENYELKM rootkit default files... nothing found
Searching for common ssh-scanners default files... nothing found
Searching for Linux/Ebury - Operation Windigo ssh... nothing found
Searching for 64-bit Linux Rootkit ... nothing found
Searching for 64-bit Linux Rootkit modules... nothing found
Searching for suspect PHP files... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... not tested: can't exec
Checking `rexedcs'... not found
Checking `sniffer'... not tested: can't exec ./ifpromisc
Checking `w55808'... not infected
Checking `wted'... not tested: can't exec ./chkwtmp
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'... not tested: can't exec ./chklastlog
Checking `chkutmp'... not tested: can't exec ./chkutmp
Checking `OSX_RSPLUG'... not infected
Also, have you checked your server's network usage on SYS manager? If you need more advanced assistance, contact me via Skype ("a.aguayo") or WhatsApp ("+51995540103").Note my timezone is GMT-5.

You should notice that when OVH notifies you your server has been hacked, it's really serious. They are not able to notice a common hack, so, when they say your server has been hacked, it's because a rootkit or spambot has been installed on your server, so they can notice it because of high network usage. If you simply reboot your server into harddisk, without taking any actions against the hack, not only are you risking your data integrity & confidentiality, but you are also risking the continuity of OVH/SYS/KS service, as they can terminate your account if the problem persists.

mark123
09-05-2015, 02:29
It can be when going out attacks, vac ddos system detecting it. attack, after the server is locked.

You should be concerned with it came an e-mail.

01daell
09-05-2015, 00:25
Hello,

Firstly let me start by saying I am not very technical minded and when it comes to linux, I am not too up to scratch with things, so go easy!

Anyway, let me first explain my set up.

I have a Kimsufi Server which is acting as a SolusVM Master.

I then have a SoYou Start server which is running as a SolusVM Slave. On this slave I have one VPS. The VPS hosts cPanel (for my private sites only, not reselling) and ScreenConnect (RMM Server software).

Whilst I was in a Remote Session with someone I lost connection. Everything on my VPS had stopped. When I went to my SYS control panel it said "hacked". Anyway I changed the netboot to harddrive, and clicked confirmed next to "hacked" and it was booting my server again. Anyway, since then, I have had massive issues. Load times on pages take ages. SSH sometimes hangs on commands (which would usually not hang) for both the VPS and the SLAVE. When pinging the VPS and/or the SLAVE, it will lose packets sometimes. I have looked at the resource monitor and it is barely using any resources so I know its not "maxing out". I have tried a number of restarts yet no joy. I even changed netboot to load into recovery and ran the hardware scans and everything passed. Also, now my SolusVM Master more often than not can not connect to the Slave, however sometimes it will pick up a connection but then drop out after a while. I am at a loss. The Kimsufi server is running fine, but the Slave and the VPS (which is on the slave) have been terrible since this issue.

Any ideas? If anyone can give some guidance that would be great, but please remember, I might need baby-feeding the solutions such as what commands to type etc.