Hallo zusammen,
Es geht um das System welches ich im Beitrag https://forum.ubuntuusers.de/topic/sicherheitsfragen-zur-apache-installation/ erwähnt habe. Das System wurde nach 8 Tagen Live-Betrieb gehackt, und möchte mit einem Botnetz kommunizieren. Zumindest bestätigt das der Sonicwall Support.
Ich habe das System vom Internet getrennt und warte auf Rückmeldung des Softwareanbieters der das System installiert hat. Wir haben ja quasi nur die Ubuntu Serverinstallation ohne weitere Anpassungen gestellt.
Bevor ich das Backup einspiele, und mit dem Dienstleister kläre, was falsch lief, möchte ich natürlich in Erfahrung bringen, was wir uns eingefangen haben.
Ich habe daraufhin chkrootkit installiert und mal laufen lassen. Soweit ich das interpretieren kann, handelt es sich um das Windigo Botnet.
. . -> Installation von chkrootkit . update-initramfs: Generating /boot/initrd.img-4.4.0-22-generic W: mdadm: /etc/mdadm/mdadm.conf defines no arrays. Fehler traten auf beim Bearbeiten von: udev lxd plymouth plymouth-theme-ubuntu-text openssh-server E: Sub-process /usr/bin/dpkg returned an error code (1) . . -> Ende der chkrootkit Installation . truefusionadmin@TruefusionPortal:/$ sudo chkrootkit ROOTDIR is `/' Checking `amd'... not found Checking `basename'... not infected Checking `biff'... not found Checking `chfn'... not infected Checking `chsh'... not infected Checking `cron'... not infected Checking `crontab'... not infected Checking `date'... not infected Checking `du'... not infected Checking `dirname'... not infected Checking `echo'... not infected Checking `egrep'... not infected Checking `env'... not infected Checking `find'... not infected Checking `fingerd'... not found Checking `gpm'... not found Checking `grep'... not infected Checking `hdparm'... not infected Checking `su'... not infected Checking `ifconfig'... not infected Checking `inetd'... not infected Checking `inetdconf'... not found Checking `identd'... not found Checking `init'... not infected Checking `killall'... not infected Checking `ldsopreload'... not infected Checking `login'... not infected Checking `ls'... not infected Checking `lsof'... not infected Checking `mail'... not found Checking `mingetty'... not found Checking `netstat'... not infected Checking `named'... not found Checking `passwd'... not infected Checking `pidof'... not infected Checking `pop2'... not found Checking `pop3'... not found Checking `ps'... not infected Checking `pstree'... not infected Checking `rpcinfo'... not found Checking `rlogind'... not found Checking `rshd'... not found Checking `slogin'... not infected Checking `sendmail'... not found Checking `sshd'... not infected Checking `syslogd'... not tested Checking `tar'... not infected Checking `tcpd'... not infected Checking `tcpdump'... not infected Checking `top'... not infected Checking `telnetd'... not found Checking `timed'... not found Checking `traceroute'... not found Checking `vdir'... not infected Checking `w'... not infected Checking `write'... not infected Checking `aliens'... no suspect files Searching for sniffer's logs, it may take a while... nothing found Searching for rootkit HiDrootkit's default files... nothing found Searching for rootkit t0rn's default files... nothing found Searching for t0rn's v8 defaults... nothing found Searching for rootkit Lion's default files... nothing found Searching for rootkit RSHA's default files... nothing found Searching for rootkit RH-Sharpe's default files... nothing found Searching for Ambient's rootkit (ark) default files and dirs... nothing found Searching for suspicious files and dirs, it may take a while... The following suspicious files and directories were found: /lib/modules/4.4.0-21-generic/vdso/.build-id /lib/modules/4.4.0-22-generic/vdso/.build-id /lib/modules/4.4.0-21-generic/vdso/.build-id /lib/modules/4.4.0-22-generic/vdso/.build-id Searching for LPD Worm files and dirs... nothing found Searching for Ramen Worm files and dirs... nothing found Searching for Maniac files and dirs... nothing found Searching for RK17 files and dirs... nothing found Searching for Ducoci rootkit... nothing found Searching for Adore Worm... nothing found Searching for ShitC Worm... nothing found Searching for Omega Worm... nothing found Searching for Sadmind/IIS Worm... nothing found Searching for MonKit... nothing found Searching for Showtee... nothing found Searching for OpticKit... nothing found Searching for T.R.K... nothing found Searching for Mithra... nothing found Searching for LOC rootkit... nothing found Searching for Romanian rootkit... nothing found Searching for Suckit rootkit... nothing found Searching for Volc rootkit... nothing found Searching for Gold2 rootkit... nothing found Searching for TC2 Worm default files and dirs... nothing found Searching for Anonoying rootkit default files and dirs... nothing found Searching for ZK rootkit default files and dirs... nothing found Searching for ShKit rootkit default files and dirs... nothing found Searching for AjaKit rootkit default files and dirs... nothing found Searching for zaRwT rootkit default files and dirs... nothing found Searching for Madalin rootkit default files... nothing found Searching for Fu rootkit default files... nothing found Searching for ESRK rootkit default files... nothing found Searching for rootedoor... nothing found Searching for ENYELKM rootkit default files... nothing found Searching for common ssh-scanners default files... nothing found Searching for Linux/Ebury - Operation Windigo ssh... Possible Linux/Ebury - Operation Windigo installetd Searching for 64-bit Linux Rootkit ... nothing found Searching for 64-bit Linux Rootkit modules... nothing found Searching for suspect PHP files... nothing found Searching for anomalies in shell history files... nothing found Checking `asp'... not infected Checking `bindshell'... not infected Checking `lkm'... chkproc: nothing detected chkdirs: nothing detected Checking `rexedcs'... not found Checking `sniffer'... lo: not promisc and no packet sniffer sockets eth0: not promisc and no packet sniffer sockets Checking `w55808'... not infected Checking `wted'... chkwtmp: nothing deleted Checking `scalper'... not infected Checking `slapper'... not infected Checking `z2'... chklastlog: nothing deleted Checking `chkutmp'... chkutmp: nothing deleted Checking `OSX_RSPLUG'... not infected
Vielen Dank für jeden Beitrag!
Edit: Lt. https://www.administrator.de/wissen/linux-server-windigo-botnet-infiziert-233200.html ist der Server infected.
Punkt 3
ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo "System clean" || echo "System infected" System infected
Punkt 4
ls -l /lib/x86_64-linux-gnu/libkeyutils.so.1.5 -rw-r--r-- 1 root root 14256 Dez 10 17:41 /lib/x86_64-linux-gnu/libkeyutils.so.1.5