Hello,
we recived the messages:
... really around of world after of millions of servers/VPS update/upgrade SO with cPanel millions and millions of emails is sended to email of sysadmin?
Yes, we can disable this email in /etc/csf/csf.conf, but the real point is: how we as newby inexperts investigate?
the most danger/terrible essenary is: "this update is doit by a malware", and...
how we can detect wich command make the update? (infection),
how the malware was do uploaded to server?
Please some tricks as: how we can know if really is a update ?
Some command to check/evaluate MD5 with mirror of SO ?
. . .
Really I believe is necessary a page complet with some instructions about how we as newbies can investigate this, and then can give some diagnostic preliminar to contract a sysadmin professional.
(sorry by my bad English)
we recived the messages:
Code:
Time: Thu Apr 1 06:00:14 2021 -0500
The following list of files have FAILED the md5sum comparison test. This means that the file has been changed in some way. This could be a result of an OS update or application upgrade. If the change is unexpected it should be investigated:
/usr/bin/ab: FAILED
/usr/bin/ea-php73: FAILED
/usr/bin/ea-php74: FAILED
/usr/bin/ea-php80: FAILED
/usr/bin/htdbm: FAILED
/usr/bin/htdigest: FAILED
/usr/bin/htpasswd: FAILED
/usr/bin/httxt2dbm: FAILED
/usr/bin/logresolve: FAILED
/usr/sbin/fcgistarter: FAILED
/usr/sbin/htcacheclean: FAILED
/usr/sbin/httpd: FAILED
/usr/sbin/rotatelogs: FAILED
/usr/sbin/suexec: FAILED
/bin/ab: FAILED
/bin/ea-php73: FAILED
/bin/ea-php74: FAILED
/bin/ea-php80: FAILED
/bin/htdbm: FAILED
/bin/htdigest: FAILED
/bin/htpasswd: FAILED
/bin/httxt2dbm: FAILED
/bin/logresolve: FAILED
/sbin/fcgistarter: FAILED
/sbin/htcacheclean: FAILED
/sbin/httpd: FAILED
/sbin/rotatelogs: FAILED
/sbin/suexec: FAILED
/usr/local/bin/ea-php73: FAILED
/usr/local/bin/ea-php74: FAILED
/usr/local/bin/ea-php80: FAILED
Yes, we can disable this email in /etc/csf/csf.conf, but the real point is: how we as newby inexperts investigate?
the most danger/terrible essenary is: "this update is doit by a malware", and...
how we can detect wich command make the update? (infection),
how the malware was do uploaded to server?
Please some tricks as: how we can know if really is a update ?
Some command to check/evaluate MD5 with mirror of SO ?
. . .
Really I believe is necessary a page complet with some instructions about how we as newbies can investigate this, and then can give some diagnostic preliminar to contract a sysadmin professional.
(sorry by my bad English)