GT1999
Diamond Member
So me and a new guy at work (we just started a couple of months ago) were poking around our main Linux web server. We pulled a .tar backup from the server to look around, and it was 12GB. Well, as it turns out 11GB of that is movies, porn, applications / general warez -- all in GERMAN. Also, many of the php file seem to be infected with malicious "trojan code" as Symantec has it labeled.
It looks like the entire server has basically been comprimised.
I would like to trace the intruders, if possible, which have all of the files placed in an "invisible" folder (to Linux, but viewable via NTFS/Windows) under a cgi-bin directory of a virtual website (which I will not name).
Anyone have experiene with situations like these? I don't want to delete the files right off the bat, because I'd like to catch the IP of these guys and catch them in the act and find the security breaches of the server.
From there, who knows -- probably a new server / fresh install of a new OS.
Might I also add, we just found out today that telnet is also enabled on the server (!!!) though we have been ssh'ing to it and direct root access is ENABLED...
It looks like the entire server has basically been comprimised.
I would like to trace the intruders, if possible, which have all of the files placed in an "invisible" folder (to Linux, but viewable via NTFS/Windows) under a cgi-bin directory of a virtual website (which I will not name).
Anyone have experiene with situations like these? I don't want to delete the files right off the bat, because I'd like to catch the IP of these guys and catch them in the act and find the security breaches of the server.
From there, who knows -- probably a new server / fresh install of a new OS.
Might I also add, we just found out today that telnet is also enabled on the server (!!!) though we have been ssh'ing to it and direct root access is ENABLED...