-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Curious how you resolved this? #1
Comments
Hmm. I don't recall the exact details but did a writeup/analysis of this on https://dangoldin.com/2020/05/29/anatomy-of-a-crypto-mining-hack/ so that might provide some info. I think I had to remove the folder itself but also some of the initial processes/files by tracing it backwards. |
Thanks for the reply. Interestingly, the ssh key in your analysis is the exact same one that I encountered. |
I'm surprised the hack is still going on. Were you able to trace it back to a source? I do think that origin script was in another folder but don't recall which one. You can try running "ps -a" to see the processes running and also check out your cron file to see if anything got automatically scheduled there. |
Any idea how this got installed in machine? |
We got the same attack today. We recovered it successfully and stopped the attack as users complained the site was slow. In our case they got root access. Is there some info on how they got in the first place? |
Go to your server, boot with live cd, access shell and change your key back. |
@sibidharan no idea how it got installed in first place. We terminated machine immediately, so couldn't able to troubleshoot. It might be some vulnerable packages you installed or ssh key or password is compromised. |
Yea - I think what caused it for me was installing an sftp package that I was lazy in configuring so it exposed a vulnerability that gave them access. It's pretty hard to do a deep clean since you always wonder if you got something. If easy I'd suggest just rebuilding and creating a new instance. |
In my case, it looks like a vulnerability in our gitlab instance. We notice the moment the attack happened, changed ssh key via live boot CD and got access back and ran a full scale backup on gitlab and restored it in a new machine. We are investigating the old server, keeping it live at time moment, by completely isolating it. |
@sibidharan In our case, if I remember correctly, they gained access to a non-root user account on a machine where we were running some Python applications. We could have isolated the machine and investigated further, but we made a mistake and terminated the machine. |
I'm having the same exact issues. What did you do to prevent this? The directory keeps showing up every week.
The text was updated successfully, but these errors were encountered: