New user's registration have been closed due to high spamming and low trafic on this forum. Please contact forum admins directly if you need an account. Thanks !
You only know if the attack is specific to B23 owners if you can verify no other vulnerable machines are targeted. Its like saying that only windows-users cause car accidents if your entire sample size is made up of windows users. It is classical sampling error.
Fortunately Excito has not announced any of this as a big threat(or small) since it came to their knowledge 6 days ago.
It is reassuring to non Linux-experts like myself to know that the severity of all this is lower than worth announcing as a threat, followed by recommended precautions.
How would you propose excito goes about thic anouncement then? There isnt exactly a registration requirement for purchase of a B2/3, so nobody knows who the customers are. Would you like an advert in all of the worlds newspapers?
Oh and when was the last time you heard Apple or Microsoft hand out a fix within 6 days after discovery? I think theyre doing a pretty good job.
As you can see from the above its still not quite sure whats going on and whether the proposed fix is adequate. Announcing a problem without a cure is not very useful if the cure is just days away. I'm sure once this is more clear there will be an official announcement in the section that you point out.
Caught my server sending out spam to mostly Swedish email addresses and got mighty suspicious since was pretty sure I'd restricted SMTP to localhost. After an hour of poking around found enough to find my way to this thread. What I've found and cleaned out so far;
- /tmp/sw containing the spamming package
- www-data crontab entry pointing to a script that doesn't seem to exist; * * * * * /tmp/update >/dev/null 2>&1
- an attack script pulled off a russian server.. was running as two processes named '-bash'
.. pretty sure I've gotten all of it out and the patch is applied, let's wait and see if something odd pops up again. Looks like I first got probed at the start of November but didn't notice anything before the spam portion fired up today.
Going through all they've been running through the exploit and looks like we could be having a much worse time of this. Most of the exploits actually fail because of the ARM platform .. security by accident .. "a: line 21: ./bash: cannot execute binary file" .. you apache error_log will probably provide an entertaining read if you want to follow along on everything.
More attack cruft I've found;
- /dev/shm/.a (failed to do any damage on an ARM system)
- various bitcoin miners seem to have been attempted but looks like they've also been removed, all failed again due to ARM.
Gordon wrote:Well I guess that with these last few posts the backdoor is exposed again (to a hacker reading this board).
Can you elaborate on why knowing this would open the backdoor again?
That's probably my bad. I got suspicious when I found two php files in cgi-bin and thought the one only named php was a possible back door. If they do read the forum, they now know the name of the "original" one, so to speak (I won't name it again).
I must admit I was a bit confused since it was an ARM binary, but I have gcc installed so I couldn't be sure and I dared not run it to see what would happen. Sorry again for breaking you protection
/Johan
PS Maybe you should remove the posts where we name the files.
Yes I undestood this, but I still don't know why knowing about would let them in again? It's not like they can just run any file in that directory, right?
/Johannes (Excito co-founder a long time ago, but now I'm just Johannes)
No they cannot. CGI-BIN is not indexable. However if php5.orig is executable than it can be accesses from outside and the vulnerability remains, but you added a layer of security through obscurity. Real protection would them come from either removing the execute flag from php5.orig or moving that file out of the /cgi-bin/ folder where it can no longer be executed by apache.