Welcome Guest. Please Login or Register  


You are here: Index > Virtualizor - Virtual Server Control Panel > General Support > Topic : compromised server ?



Threaded Mode | Print  

 compromised server ?, DDoS attack reported by Google (2 Replies, Read 3880 times)
advancetech
Group: Member
Post Group: Newbie
Posts: 8
Status:
Hello,

I received the following notification from Google:
Quote
We observed machines under your control participating in a DDoS attack targeting Google IPs.

The attack was a UDP  amplification attack.  In this attack, a UDP-based service is abused to attack others, wasting your bandwidth and computing resources.  For more information about this style of attack, see https://www.us-cert.gov/ncas/alerts/TA14-017A

The participating IPs under your control are listed below, along with the port number abused, the start and stop times in UTC, and the approximate amount of data sent during that time.

Note that this is simply a misconfigured server, not an abusive customer or a compromised machine.


There are no customizations in Virtualizor. Just default settings.
I don't know where to start the troubleshooting of our server.

Any suggestions?


IP: --   

compromised server ?
advancetech
Group: Member
Post Group: Newbie
Posts: 8
Status:
I found this article about RPCbind vulnerability:
Quote
disable rpcbind/rpc/portmapper service on centos 7 server
Lately I received an email from "German Federal office for information security (BSI)" informing me about an open port which included this
=================
> the Portmapper service (portmap, rpcbind) is required for mapping RPC
> requests to a network service. The Portmapper service is needed e.g.
> for mounting network shares using the Network File System (NFS).
> The Portmapper service runs on port 111 tcp/udp.
>
> In addition to being abused for DDoS reflection attacks, the
> Portmapper service can be used by attackers to obtain information
> on the target network like available RPC services or network shares.
================
so I checked and got this
------------------
[]# rpcinfo
  program version netid    address                service    owner
    100000    4    tcp6      ::.0.111              portmapper superuser
    100000    3    tcp6      ::.0.111              portmapper superuser
    100000    4    udp6      ::.0.111              portmapper superuser
    100000    3    udp6      ::.0.111              portmapper superuser
    100000    4    tcp      0.0.0.0.0.111          portmapper superuser
    100000    3    tcp      0.0.0.0.0.111          portmapper superuser
    100000    2    tcp      0.0.0.0.0.111          portmapper superuser
    100000    4    udp      0.0.0.0.0.111          portmapper superuser
    100000    3    udp      0.0.0.0.0.111          portmapper superuser
    100000    2    udp      0.0.0.0.0.111          portmapper superuser
    100000    4    local    /var/run/rpcbind.sock  portmapper superuser
    100000    3    local    /var/run/rpcbind.sock  portmapper superuser
-------------------
So here is how I closed that port and disabled rpc service on my centos 7 server
-----------------------------
# yum install rpcbind
# systemctl disable rpcbind
# systemctl disable rpcbind.socket
# systemctl stop rpcbind
# systemctl stop rpcbind.socket
----------------------------
now rpcinfo shows this
----------------------------
[]# rpcinfo
rpcinfo: can't contact rpcbind: RPC: Remote system error - Connection refused
----------------------------
that's it

I hope this will solve the problem
IP: --   

compromised server ?
jevingala
Group: Virtualizor Team
Post Group: Super Member
Posts: 742
Status:
Hi,
Yes, you can try those steps.Let us know if it gives any issues.


-----------------------
Regards,
Virtualizor Team.
http://virtualizor.com/
IP: --   

« Previous    Next »

Threaded Mode | Print  



Jump To :


Users viewing this topic
1 guests, 0 users.


All times are GMT. The time now is April 19, 2024, 3:01 am.

  Powered By AEF 1.0.8 © 2007-2008 Electron Inc.Queries: 11  |  Page Created In:0.023