On 8/18/11, one of my servers was apparently compromised. Between 8/18 and 8/24, I had 3 files uploaded to my /tmp/ directory:
backs
bds (Backdoor shell)
dp
Then later, these files were uploaded to /home/myaccount/public_html/somedirectory/:
.chase.com (a directory with a lot of files)
chase.com.zip (264kb)
[email protected] (122kb)
index.html (0 bytes)
I've deleted these files, changed my root password, ran WHM's Trojan horse scanner, and manually looked through all of the recently-updated files. I don't see any more files that are suspicious.
According to ConfigServer firewall, the last SSH login was several months ago, and all of the IPs that are listed as a login are recognized. The server only has one account (mine), and everything on this account was hand-rolled; no Joomla or Wordpress (or anything else) installed.
I'm running WHM 11.30.2 (build 1), Apache 2.0.63, and PHP 5.2.11.
Here's the question:
With no programs on my account (to my knowledge) that have permission to access to the files outside of the account directory, the only way I can imagine that a hacker would have gained access to the /tmp/ directory would be if they already had root access. And if they didn't get in by brute force (or CSF would have shown the login), then is there a vulnerability in my cPanel or PHP versions?
Any other advice on tracking down the original point of entry?
backs
bds (Backdoor shell)
dp
Then later, these files were uploaded to /home/myaccount/public_html/somedirectory/:
.chase.com (a directory with a lot of files)
chase.com.zip (264kb)
[email protected] (122kb)
index.html (0 bytes)
I've deleted these files, changed my root password, ran WHM's Trojan horse scanner, and manually looked through all of the recently-updated files. I don't see any more files that are suspicious.
According to ConfigServer firewall, the last SSH login was several months ago, and all of the IPs that are listed as a login are recognized. The server only has one account (mine), and everything on this account was hand-rolled; no Joomla or Wordpress (or anything else) installed.
I'm running WHM 11.30.2 (build 1), Apache 2.0.63, and PHP 5.2.11.
Here's the question:
With no programs on my account (to my knowledge) that have permission to access to the files outside of the account directory, the only way I can imagine that a hacker would have gained access to the /tmp/ directory would be if they already had root access. And if they didn't get in by brute force (or CSF would have shown the login), then is there a vulnerability in my cPanel or PHP versions?
Any other advice on tracking down the original point of entry?