📜 ⬆️ ⬇️

About hacking servers FirstVDS

Not long ago, a note appeared with a story about a large number of compromised FirstVDS servers. We startled, conducted our own investigation without delay, and want to talk about its results.

People are gambling, and some even too much. They are joining the ranks of online casino customers. In particular, the casino "Volcano". As in all such institutions, there are very fond of new customers. Therefore, Vulkan invites everyone to participate in their referral program: you are our clients, and we give you 5% of the earnings from them. It attracts some people who are not too clean.

True, they don’t turn around too widely, because since 2014, online casinos in Russia have been banned. From the word at all. And since 2015, their sites are being shot blocked without trial. Therefore, methods of attracting customers are used far from clean. For example, you can add specially trained viruses to virtual servers of online stores and quietly redirect their traffic to online casino sites.

In the summer of this year, one of the clients sent us a letter in which he complained about hacking his server. We found the victims and sent them a message stating the fact of infection, explained how it happened and what to do about it. Asked to upgrade. “The old horse will not spoil the furrow” - this is not about the software industry, here the old stuff can plow the whole field.
')
At this calmed down. The fact is that we offer servers as is - with available software and without administration. For example, once bought up machines with FreeBSD 6 OS, FreeBSD Jail virtualization system and ISPmanager 4.x web hosting control panel. We believe that customers know better than us what they really need. This includes whether they want to update the OS and other software that is installed on the server. Quite a few of our customers do not rush to update. What hackers took advantage of - through the holes of the old software, they hooked the virus, which directs the traffic not to the right place.

The same thing happened with the author of the article, which became the reason for this story. Having discovered the virus cli.php, which supplies the traffic to the online casino "Vulkan", he wondered if he was not alone in his misfortune. It turned out not. So there was news about 3000 hacked sites on 1000 servers. The 0x31.ru domain acted as the virus coordinator, the owner of which received unearned income from the casino's referral program.

Naturally, we could not pass by such news, and conducted their investigation.


Any owner of VDS can independently check its server:

Freebsd: find /home -name .cli.php
Linux: find /var/www -name .cli.php

Everything turned out to be like that joke: "horror, of course, but not horror-horror." We managed to identify the domains that control malware (this includes the above 0x31.ru). We also found 7 checksums of the file cli.php, which are distributed as follows:

Check sumNumber of infected sitesShare of total
MD5 164433.82%
MD5 273238.45%
MD5 320.1%
MD5 4one0.05%
MD5 5693.62%
MD5 620.1%
MD5 745423.85%

The total number of infected sites is 1904.

Next, we sorted all found versions of cli.php by the date of infection:

YearShare of total
20090.45%
20102.59%
20114.22%
201214.89%
201313.39%
20145.94%
20156.8%
201651.7%

The fact that this year accounts for half of all infections is easy to explain: these are statistics as of "today", and since 2009, the owners of the servers have managed to update the software and remove the malware. In addition, new customers are constantly needed by everyone, including the casino, so the virus does not have time to become covered with dust - the tool is in demand, it does not lodge. Although even if cli.php is located on the server, it’s still not a fact that it is still infected. Was infected - yes. And if the owner of VDS has updated the software and closed the vulnerabilities, then the malware has stopped working.

After this story, we took the initiative and updated all users of ISPmanager 4.x to the latest version in this thread. It no longer has the aforementioned vulnerability.

But we’ll remind everyone again: update the software on the servers more often. They deserve it.

Source: https://habr.com/ru/post/311584/


All Articles