Re: Malware 3

2014-07-30 Thread Nico Kadel-Garcia
On Wed, Jul 30, 2014 at 1:29 AM, Brandon Vincent brandon.vinc...@asu.edu wrote: On Wed, Jul 30, 2014 at 4:27 AM, Nico Kadel-Garcia nka...@gmail.com wrote: Once someone is in as root, they can manipulate your basic system libraries, including the ones used to build checksums and audit for

Malware 3

2014-07-29 Thread Larry Linder
One of our servers has Malware on it and it hammers the eth0. using /sbin/ifconfig you look at a few thousand reads and 3 G of transmits. Transmits roll up at about 0.3 G every 2 seconds. What keeps this bound is that the ATT network it is tied to is only good for about 200K up load and 1.5 meg

Re: Malware 3

2014-07-29 Thread Konstantin Olchanski
On Tue, Jul 29, 2014 at 05:23:48PM -0400, Larry Linder wrote: One of our servers has Malware on it and it hammers the eth0... Search on Google using 'IptabLes' and 'IptbLex' If you do not use single quotes all the upper case gets replaced with lower case and you do not find anything.

Re: Malware 3

2014-07-29 Thread David Sommerseth
- Original Message - From: Larry Linder larry.lin...@micro-controls.com To: scientific-linux-users@fnal.gov Sent: Tuesday, 29 July, 2014 11:23:48 PM Subject: Malware 3 Is it contained in a OS file? as some others viruses where the file contains the orrig in the first 4096 bytes

Re: Malware 3

2014-07-29 Thread Brandon Vincent
On Tue, 2014-07-29 at 17:23 -0400, Larry Linder wrote: If anyone is interested I will share the details. Larry, Are you running Apache Struts, Apache Tomcat, or Elasticsearch by any chance? Please review CVE-2013-2115, CVE-2013-1966, and CVE-2014-3120 to see if any of these apply to your system

Re: Malware 3

2014-07-29 Thread Nico Kadel-Garcia
On Tue, Jul 29, 2014 at 10:07 PM, Brandon Vincent brandon.vinc...@asu.edu wrote: On Tue, 2014-07-29 at 17:23 -0400, Larry Linder wrote: If anyone is interested I will share the details. Larry, Are you running Apache Struts, Apache Tomcat, or Elasticsearch by any chance? Please review

Re: Malware 3

2014-07-29 Thread Brandon Vincent
On Wed, Jul 30, 2014 at 4:27 AM, Nico Kadel-Garcia nka...@gmail.com wrote: Once someone is in as root, they can manipulate your basic system libraries, including the ones used to build checksums and audit for intrusion. Take it offline and *replace* that OS, ASAP, and consider any passwords