So my CPanel server has been under constant attack.
Phishing sites are being reported on many of our customers sites. Once We clean up one another pops up.
Here is what has been done to harden the server.
Installed ModSecurity and recompiled Apache with the latest stable versions.
Changed to RUid
Installed CXS and ran scans to find many sites hacked and it was cleaned up.
Installed the ConfigServer Firewall script to help manage the attempts and block the repeated attacks.
Changed all reseller passwords and increased password complexity to 65
Forced all clients to change passwords.
Upgraded all scripts that were out of date using Softaculous.
No users have SSH other than root and JailShell is enabled in case.
Ran the security advisor in CPanel and made the appropriate corrections.
Still they seem to be able to get it and make changes.
I even terminated an account. Re-created it with a password of 13 random chars and just put a blank index.html page in the root and they were able to install the Dropbox script to upload files and setup a phishing site.....
I'm getting at a loss for how these are happening. I'm probably overlooking something stupid.....
Any suggestions would be greatly appreciated.
Phishing sites are being reported on many of our customers sites. Once We clean up one another pops up.
Here is what has been done to harden the server.
Installed ModSecurity and recompiled Apache with the latest stable versions.
Changed to RUid
Installed CXS and ran scans to find many sites hacked and it was cleaned up.
Installed the ConfigServer Firewall script to help manage the attempts and block the repeated attacks.
Changed all reseller passwords and increased password complexity to 65
Forced all clients to change passwords.
Upgraded all scripts that were out of date using Softaculous.
No users have SSH other than root and JailShell is enabled in case.
Ran the security advisor in CPanel and made the appropriate corrections.
Still they seem to be able to get it and make changes.
I even terminated an account. Re-created it with a password of 13 random chars and just put a blank index.html page in the root and they were able to install the Dropbox script to upload files and setup a phishing site.....
I'm getting at a loss for how these are happening. I'm probably overlooking something stupid.....
Any suggestions would be greatly appreciated.