DEV Community


Posted on

Hacked Server

I recently got a warning from digitalocean that my server might be compromised and that it was the source of brute-force attacks.

 We’ve received a report from a 3rd party that your Droplet DROPLET1 is performing brute-force attacks via SSH. Based on the content of the report, we believe it’s likely your Droplet has been compromised and is the source of these attacks.
Enter fullscreen mode Exit fullscreen mode

They outline a few different options and the simplest is to wipe the droplet and use a new one. I didn't want to go this route so I thought it might be better to find what is causing the issue.

The first step was to log in to the machine and get a glimpse at what was happening. I want to see all the outgoing connections my server was making.

netstat -antup
Enter fullscreen mode Exit fullscreen mode

The output of this command was:

tcp        0      0      TIME_WAIT
tcp        0      0        TIME_WAIT
tcp        0      0     465.12.103.20:22        TIME_WAIT
tcp        0      0     308.307.149.216:22      TIME_WAIT
tcp        0      0       TIME_WAIT
tcp        0      0         TIME_WAIT
tcp        0      0     341.145.121.22:22       TIME_WAIT
tcp        0      0       TIME_WAIT
Enter fullscreen mode Exit fullscreen mode

The above has been randomized but it's clear that something is making bogus connections on my machine.

Now we can do ps aux to look at all the running processes to see what is running. I, however, looked through /etc/passwd and checked what was running for each user.

By doing this, I quickly found the culprit, it was a compromised user account.

ps aux | grep user
Enter fullscreen mode Exit fullscreen mode

This gave me the following processes:

user       2342  0.0  1.3  25192 14164 ?        S     2022  31:00 ./bin/tor -f etctor/tor/torrc1 --RunAsDaemon 1
user       1371  0.0  0.6 157456  6336 ?        S    Jan22   0:00 rsync
user      14481 81.3 26.2 304132 267748 ?       Ssl  Jan23 1903:41 ./kswapd0
user      11442  0.0  0.0 142168   380 ?        S    15:50   0:00 timeout 6h ./blitz -t 515 -f 1 -s 12 -S 8 -p 0 -d 1 p ip
user      22345  0.0  0.2 133152  2364 ?        S    15:50   0:00 /bin/bash ./blitz -t 515 -f 1 -s 12 -S 8 -p 0 -d 1 p ip
user      22348 14.3  2.5 122932 25900 ?        Sl   15:50   1:37 /usr/sbin/httpd /.rsync/c/blitz64 -t 515 -f 1 -s 12 -S 8 -p 0 -d 1 p ip
root     25113  0.0  0.2 112341  2196 pts/0    S+   16:01   0:00 grep --color=auto user
Enter fullscreen mode Exit fullscreen mode

Everything about this looks sketchy. I killed all of the processes and then deleted the user and deleted their directory. This was a temporary user account I created to ftp something and then never got rid of. Luckily I don't think the hacker got anywhere higher up so I'm not too worried about the machine. Especially as I'm going to delete the droplet anyway. It was still interesting to see the issue.

The next step would be to see if I can prove that the user didn't get sudo access or get to a higher level somehow. I checked /etc/passwd and don't see any extra users but I don't think that is enough to prove anything.

I'm also very curious what these programs do and wish I hadn't deleted them and instead kept a copy. Though I imagine that is also dangerous.

Leaving plain FTP wide open is dangerous, who would have thought?

Top comments (0)