Our main mail/web server, lodestone, got rootkitted last night. Unless I've missed a security bulletin recently - which I could well have, given how things have been - it was probably a local exploit via a stolen user account. However, that's not guaranteed. (I have some suspicions about where to look; I saw a login yesterday that somewhat surprised me, but not enough for me to be alarmed. That was probably a mistake.) The rootkitting happened last night, mostly around midnight PDT.
The box has been fundamentally compromised; in addition to widespread webspace hacking, /bin and files in it have been changed. The box will need to be flattened and rebuilt. Unfortunately, this work cannot really begin until
annathepiper gets back. We are also in the middle of trying to move, making things much more difficult.
Assume we will be down for AT LEAST four days, probably longer. During this time, our net connectivity will probably be intermittant. I may be able to get a skeleton box online to catch incoming mail before then, but no promises.
When lodestone comes back up, we will be requiring new passwords from ALL users. ALL executable files in userspace should be deleted, and either recompiled or reinstalled. These were not expert crackers; the work was sloppy; they left fingerprints everywhere, and some of their attempts to modify binaries resulted in nonexecutable files, rather than trojaned files, which is good. But that doesn't mean they were totally inept. And they were certainly trying to do as much damage and backdooring as possible, so we need to react as if they were better than they are.
If there are any former Murknet admins who think they can help/do something useful/provide advice, let me know.
The box has been fundamentally compromised; in addition to widespread webspace hacking, /bin and files in it have been changed. The box will need to be flattened and rebuilt. Unfortunately, this work cannot really begin until
Assume we will be down for AT LEAST four days, probably longer. During this time, our net connectivity will probably be intermittant. I may be able to get a skeleton box online to catch incoming mail before then, but no promises.
When lodestone comes back up, we will be requiring new passwords from ALL users. ALL executable files in userspace should be deleted, and either recompiled or reinstalled. These were not expert crackers; the work was sloppy; they left fingerprints everywhere, and some of their attempts to modify binaries resulted in nonexecutable files, rather than trojaned files, which is good. But that doesn't mean they were totally inept. And they were certainly trying to do as much damage and backdooring as possible, so we need to react as if they were better than they are.
If there are any former Murknet admins who think they can help/do something useful/provide advice, let me know.
no subject
Date: 2004-07-24 12:10 pm (UTC)no subject
Date: 2004-07-24 12:10 pm (UTC)my work site got hacked last week; if it was my account then i probably have more cruft to clean up at work :/
no subject
Date: 2004-07-24 12:14 pm (UTC)first, people don't usually back up the "system" files -- like the programs you run and stuff, which are what live in /bin -- just people's own data. but since dar knows that stuff like that has been changed, it would need to be replaced, and may not have been backed up. since she's asking people to reinstall/recompile, my guess is that some system libraries have been changed as well. it's safer to just thoroughly clean out if you are uncertain of (a) the extent of the damage and (b) the exact time of the compromise, and know you have a clean backup from before it.
second, if you don't know how the crackers got in, there may be a security hole in your system that you don't know about. in which case updating the entire system is the right thing to do.
no subject
Date: 2004-07-24 12:18 pm (UTC)Although it looks like you don't actually have any working DNS either, so that probably won't help.
no subject
Date: 2004-07-24 12:21 pm (UTC)no subject
Date: 2004-07-24 12:35 pm (UTC)no subject
Date: 2004-07-24 12:42 pm (UTC)no subject
Date: 2004-07-24 01:10 pm (UTC)don't fret that you don't happen to be a sysadmin. i work with BRAIN SCIENTISTS!! -- and very very very few have the least idea how to administer computers :)
no subject
Date: 2004-07-24 04:46 pm (UTC)no subject
Date: 2004-07-24 06:14 pm (UTC)no subject
Date: 2004-07-24 07:09 pm (UTC)I've never tried this, however, as my OS X box doesn't have a burner. But it should do it.
(this is Panther -- 10.3. Your mileage may otherwise vary, but I'm pretty sure it's been that same program back to 10.0.)
no subject
Date: 2004-07-24 10:04 pm (UTC)The more worrisome part of this is the operating system itself. :( As Vicka has posted, it will be most secure for us to flatten the box, start from scratch, and make damn sure that we have all the latest security updates before we go live again.
And people bitch at Windows boxes for these problems. :P GAH!
(My own personal worry re: user data is going to be the huge mysql databases that power both my web pages--the personal one and the Two Moons one. If I can't get that back online and have to retype all that in, I will be EXTREMELY pissed. :P )
no subject
Date: 2004-07-24 10:53 pm (UTC)no subject
Date: 2004-07-24 11:26 pm (UTC)no subject
Date: 2004-07-25 08:19 am (UTC)http://www.grsecurity.net/
no subject
Date: 2004-07-25 09:53 am (UTC)no subject
Date: 2004-07-25 10:59 am (UTC)no subject
Date: 2004-07-25 09:00 pm (UTC)Failing that, there are paper clips. Does your CD tray have a tiny hole anywhere? It may be hidden under the faceplate. If the OS doesn't know it has a CD, it won't hurt it to remove the coaster without it ever knowing otherwise. :)