Debian Lenny hacked - SHV4 Rootkit, SHV5 Rootkit installed, root password exploited

Discussion in 'Server Operation' started by denbert, Dec 8, 2009.

  1. denbert

    denbert New Member

    Hi,

    I have a remote server at a hosting center. Unfortunately I've been slappy with the updates due to the fact that I've been using a wordpress theme, which couldn't work with future wordpress updates.

    I was contacted by mail with this subject: Fraudulent site - please shut down! [BP 9675.43-44] IP:xx.xxx.xxx.xx

    Dear Sirs:

    RSA, an anti-fraud and security company, is engaged in contract to assist Poste Italiane S.p.A. and its related entities “(Gruppo PosteItaliane)” in preventing or terminating online activities that target or may potentially target Poste Italiane/Gruppo Poste Italiane clients as potential fraud victims.

    Poste Italiane S.p.A. is one of the largest Italian companies and operates mainly in the postal and banking/financial sectors. Poste Italiane official sites (www.posteitaliane.it and www.poste.it) are among the most famous Italian sites and are registered by the competent Italian authority on Italian top-level domain (.it).... snip


    I've installed rkhunter and ran it, and bingo:

    Rootkit checks...
    Rootkits checked : 110
    Possible rootkits: 2
    Rootkit names : SHV4 Rootkit, SHV5 Rootkit

    When I logged in the the server, I've noticed the fact that last login from root was done from another address than mine!

    Therefore the root password has been exploited!

    I removed MySql, Lighttpd, Webmin and has changed SSH port to 222, furtheremore I've disabled rootlogin in the sshd config file.

    I would really like to avoid a reinstall as this will give me further costs, due to the fact that the server is at a hosting center.

    Anyone who can recommend a solution/guide?
     
  2. topdog

    topdog HowtoForge Supporter

    There must be backdoors left on the system to allow the hacker back in, am sure most of the binaries you use for checking such have been modified by the attacker. If you can run the binaries from removable media then you may be able to cleanup the machine. (The binaries in question would be things like lsmod, ps, w, who netstat, lsof)
     
  3. denbert

    denbert New Member

    Yep - I realize that I'm in a "bad-standing" and therefore I will shutdown the server now and prepare a clean install later.

    The worst is that I'm the only one to blame :mad:
     

Share This Page