Hello,

there are few chances of replacing sshd without being root. In your place i would install every server new.

I think, he spied out passwords and maybe got root-Passwords in this way. Possibly he has even accessed servers where you didn't find him and left backdoors there. (manipulation of ~/.ssh/authorized_keys, another user with userid 0, replaced software, replaced suid-accesses, added software, ...)

When you reinstall your servers think of not using Login+Password but public-private key for user authentication. You can even forward such a combination. But be aware, that if key forwarding is enabled it can be used by attackers too. You should then protect the private key by password and use it only from trusted machines. Avoid keyforwarding unless you need it, for instance when copying files from one server to the other it could be useful. Lock your trusted working computer always when leaving it and think of encrypting the filesystem. (Be aware that a local attacker can install a password sniffer even if you encrypted your system partition)

good luck and think of not accessing the new installed computers from old ones ...
Regards,
Guntram

Johann Spies schrieb:
On Mon, Jun 01, 2009 at 07:23:27AM -0400, Michael Stone wrote:

Yes, that's a typical location for intruders to drop files. Easiest thing to do is reinstall after thinking about how the compromise may have occurred. (Did you update regularly, including kernel updates? Did all accounts have strong passwords? Do you have web applications not managed by the system that weren't being updated? etc.)

We had a serious situation on this computer and several others. Ssh
and sshd were replaced by the cracker's own version and in once case
nearly all the pam-related stuff were replaced also.  Through this
customised versions of ssh the cracker harvested every password that
was used during ssh logins and ssh sessions.

We are winning the battle and will in the next few weeks try do the
analysis of what went wrong.

Regards
Johann


--
Guntram Trebs
freier Programmierer und Administrator

g...@trebs.net
+49 (30) 42 80 61 55
+49 (178) 686 77 55


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to