Hello,
I noticed some users running a suspicious process /usr/bin/host on a couple of our servers. In some cases, this process takes a lot of resources. When I got an automated mail from a server provider that WordPress sites were being bruteforced from our server, I got more worried. When I investigated the accounts further, I discovered the following
1. They were running either WordPress or Joomla which suggests they could have been compromised
2. The accounts has a file .sd0 uploaded in either the public_html folder or one of the folders of either Joomla or WordPress such as a themes folder
3. The accounts have a cronjob running (in some cases multiple instances of the cronjob) with a directory similar to where the .sd0 file was uploaded. A sample of such cronjob is /home/xxxxxx/public_html/wp-content/themes/twentytwelve/1.sh . Note that the file 1.sh
My guess is that the sd0 file runs an API that creates the cron. Has anyone had this issue before or heard of it? I have told the owners of the accounts to upgrade and secure their installations but I cannot trust they would attend to this quickly enough.
Hope someone can help...
I noticed some users running a suspicious process /usr/bin/host on a couple of our servers. In some cases, this process takes a lot of resources. When I got an automated mail from a server provider that WordPress sites were being bruteforced from our server, I got more worried. When I investigated the accounts further, I discovered the following
1. They were running either WordPress or Joomla which suggests they could have been compromised
2. The accounts has a file .sd0 uploaded in either the public_html folder or one of the folders of either Joomla or WordPress such as a themes folder
3. The accounts have a cronjob running (in some cases multiple instances of the cronjob) with a directory similar to where the .sd0 file was uploaded. A sample of such cronjob is /home/xxxxxx/public_html/wp-content/themes/twentytwelve/1.sh . Note that the file 1.sh
My guess is that the sd0 file runs an API that creates the cron. Has anyone had this issue before or heard of it? I have told the owners of the accounts to upgrade and secure their installations but I cannot trust they would attend to this quickly enough.
Hope someone can help...