17/04/2011, 13:19
|
| | | Fecha de Ingreso: abril-2011 Ubicación: Barcelona
Mensajes: 15
Antigüedad: 13 años, 6 meses Puntos: 0 | |
Limpiar vps con virus Amigos Saludos Cordiales
Yo actualmente tengo un vps pero al parecer esta infectado, queria rcomendaciones de ustedes a ver como puedo limpiar el vps. esto fue el registro que me enviaron los del datacenter pero no me indican el dominio afectado y alli poseo 70 cuentas de hosting:
Greetings
:Type of attack: URL Injection -- attempt to inject / load files onto the
server via PHP/CGI vulnerabilities
Sample log report including date and time stamp (1st field is "request", 2nd
field is the IP address or the domain name being attacked, and the 3rd field
is the IP address or domain name of the attacker)
: Request: ramaui.com 173.212.202.90 - - [16/Apr/2011:07:03:25 -0500] "GET
/content/496cf449c6d71/MLS_
Data_Feeds.html/?option=com_datafeeds&controller=../../../../../../../../../../../../..//proc/self/environ%00
HTTP/1.1" 500 3560 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US;
rv:1.8.1.8pre) Gecko/20070928 Firefox/2.0.0.7 Navigator/9.0RC1"
TamFjUt@CS0AAAsPfi0 "-"
Request: ramaui.com 173.212.202.90 - - [16/Apr/2011:07:03:26 -0500] "GET
/?option=com_datafeeds&controller=../../../../../../../../../../../../..//proc/self/environ%00
HTTP/1.1" 500 3560 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US;
rv:1.8.1.8pre) Gecko/20070928 Firefox/2.0.0.7 Navigator/9.0RC1"
TamFjkt@CS0AAEGSJAY "-"
Request: ramaui.com 173.212.202.90 - - [16/Apr/2011:07:03:26 -0500] "GET
/content/496cf449c6d71/?option=com_datafeeds&controller=../../../../../../../../../../../../..//proc/self/environ%00
HTTP/1.1" 500 3560 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US;
rv:1.8.1.8pre) Gecko/20070928 Firefox/2.0.0.7 Navigator/9.0RC1"
TamFjkt@CS0AAECEFrs "-"
NOTES
:URL Injection attacks typically mean the server for which the IP address of
the attacker is bound is a compromised server.
Please check the server behind the IP address above for suspicious files in
/tmp, /var/tmp, /dev/shm, /var/spool/samba, /var/spool/vbox,
/var/spool/squid, and /var/spool/cron Please use "ls -lab" for checking
directories as sometimes compromised servers will have hidden files that a
regular "ls" will not show.
Please also check the process tree (ps -efl or ps -auwx) for suspicious
processes; often times the malware / hack pretends to be an Apache process.
Clam Anti-virus, clamscan, can also be used to find commonly used PHP and
Perl-based hacks, including various php shells, on a server using the
“--infected” and “--recursive” options.
You may also want to check out using root kit detection tools -
http://www.chkrootkit.org/, http://www.rootkit.nl/, and http://
http://www.ossec.net/en/rootcheck.html as tools which should be used in
addition to checking the directories and process tree.
### EOF NOTES ###
Please take appropriate action to stop these attacks from happening. |