I've been trying to track down this exploit on my server now for sometime with no luck and was wondering if anyone here has seen something similar and could maybe point me in the right direction? So far I've looked though my logs but cannot find any info that would lead me to the culprit. I am now starting to suspend my accounts one at a time to see if the exploit ceases, to try and narrow down the exact location. As I only have 20 accounts on the server it shouldn't take me long. Is there a better way to do this without inconveniencing my clients? Because my firewall is catching and blocking the attempts to connect to the outside ip address I feel I have time to try and find the exploit before reformatting the os on my server (last resort). Not to mention learn more about managing my own server as I have little experience in this area. I have also downloaded and run Maldet with no issues found. Below is my server info and the actual log notification about the exploit.
CENTOS 6.5 i686 standard
WHM 11.40.1 (build 11)
cPanel Version 11.40.1 (build 11)
Apache version 2.2.25
PHP version 5.3.27
MySQL version 5.5.35-cll
Perl version 5.10.1
Kernel version 2.6.32-358.18.1.el6.
Config Server Security & Firewall
Config Server Exploit Scanner
Config Server Mailscanner
Mod Security
Rootkit Hunter version 1.4.0
Chkrootkit
ClamAV
Maldet
Here is the log I see every hour of every day and my packet loss shows 600-1400 (From myip - 1440 packets to tcp(80)) on my ip address daily.
CENTOS 6.5 i686 standard
WHM 11.40.1 (build 11)
cPanel Version 11.40.1 (build 11)
Apache version 2.2.25
PHP version 5.3.27
MySQL version 5.5.35-cll
Perl version 5.10.1
Kernel version 2.6.32-358.18.1.el6.
Config Server Security & Firewall
Config Server Exploit Scanner
Config Server Mailscanner
Mod Security
Rootkit Hunter version 1.4.0
Chkrootkit
ClamAV
Maldet
Here is the log I see every hour of every day and my packet loss shows 600-1400 (From myip - 1440 packets to tcp(80)) on my ip address daily.
Time: Mon Feb 17 06:52:24 2014 -0800
UID: 99 (nobody)
Hits: 11
Sample of port hits:
Feb 17 06:51:03 myserver kernel: Firewall: *TCP_OUT Blocked* IN= OUT=eth0 SRC=myip DST=192.155.95.153 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=31907 DF PROTO=TCP SPT=41831 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=99 GID=99