Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

Please, won't somebody tell me what diddie-wa-diddie means?


dovenet / Unix / Ubuntu, Crypto Malware

SubjectAuthor
* Ubuntu, Crypto MalwareAndroid8675
+* Ubuntu, Crypto MalwareDigital Man
|`* Ubuntu, Crypto MalwareAndroid8675
| +* Ubuntu, Crypto MalwareDigital Man
| |`- Ubuntu, Crypto MalwareAndroid8675
| `* Ubuntu, Crypto MalwareMRO
|  `- Ubuntu, Crypto MalwareAndroid8675
`* Ubuntu, Crypto MalwareMRO
 +* Ubuntu, Crypto MalwareArelor
 |`- Ubuntu, Crypto MalwareMRO
 `- Ubuntu, Crypto MalwareAndroid8675

1
Ubuntu, Crypto Malware

<6373B57C.11215.dove-lnx@vert.synchro.net>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=16&group=DOVE-Net.Unix#16

  copy link   Newsgroups: DOVE-Net.Unix
From: android8675@VERT (Android8675)
To: All
Subject: Ubuntu, Crypto Malware
Message-ID: <6373B57C.11215.dove-lnx@vert.synchro.net>
Date: Tue, 15 Nov 2022 00:51:24 -0800
X-Comment-To: All
Path: rocksolidbbs.com!not-for-mail
Organization: Vertrauen
Newsgroups: DOVE-Net.Unix
X-FTN-PID: Synchronet 3.20a-Win32 v320a_dev/f3da77c17 Nov 14 2022 MSC 1929
X-FTN-CHRS: CP437 2
WhenImported: 20221115075124-0800 41e0
WhenExported: 20221115101829-0800 41e0
ExportedFrom: VERT dove-lnx 11215
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Android8675 - Tue, 15 Nov 2022 08:51 UTC

Hey all, anyone have any experience with crypto infected Linux systems? My box that I use has mxrig running, and I've no idea how it got there, where it's hiding, or how to get it off my system. Speculating that it could be some rootkit bologna, and there's vague suggestions on the googles as to how to get it off my system without "nuking it from orbit".

So, before I do that I thought I might see if there's anyone who's had experience with this sort of thing who might be willing to take a peek? Drop me a note at andyob [at] gmail.com if you've had some experience. I got the thing backed up, so I'm ok with letting you pop-on and see if you can work some magic.

Thanks in advance,
-A @ shodanscore.com

---
■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net

Ubuntu, Crypto Malware

<6373EDB2.11217.dove-lnx@vert.synchro.net>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=17&group=DOVE-Net.Unix#17

  copy link   Newsgroups: DOVE-Net.Unix
From: digital.man@VERT (Digital Man)
To: Android8675
Subject: Ubuntu, Crypto Malware
Message-ID: <6373EDB2.11217.dove-lnx@vert.synchro.net>
Date: Tue, 15 Nov 2022 04:51:14 -0800
X-Comment-To: Android8675
Path: rocksolidbbs.com!not-for-mail
Organization: Vertrauen
Newsgroups: DOVE-Net.Unix
In-Reply-To: <6373B57C.11215.dove-lnx@vert.synchro.net>
References: <6373B57C.11215.dove-lnx@vert.synchro.net>
X-FTN-PID: Synchronet 3.20a-Linux v320a_dev/5b30c2d10 Nov 11 2022 GCC 12.2.0
X-FTN-CHRS: CP437 2
WhenImported: 20221115115114-0800 41e0
WhenExported: 20221115161822-0800 41e0
ExportedFrom: VERT dove-lnx 11217
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Digital Man - Tue, 15 Nov 2022 12:51 UTC

Re: Ubuntu, Crypto Malware
By: Android8675 to All on Tue Nov 15 2022 07:51 am

> Hey all, anyone have any experience with crypto infected Linux systems? My
> box that I use has mxrig running, and I've no idea how it got there, where
> it's hiding, or how to get it off my system. Speculating that it could be
> some rootkit bologna, and there's vague suggestions on the googles as to how
> to get it off my system without "nuking it from orbit".
>
> So, before I do that I thought I might see if there's anyone who's had
> experience with this sort of thing who might be willing to take a peek? Drop
> me a note at andyob [at] gmail.com if you've had some experience. I got the
> thing backed up, so I'm ok with letting you pop-on and see if you can work
> some magic.

I was running a version of GitLab (a year ago?) that had an exploit published and I was vulnerable for about 24 hours before upgrading to a fixed GitLab version. During that 24 hours, a crypto miner (I forget the name) was installed and it was pretty obvious from the impact on CPU utilization. I found and killed the process manually and deleted the maliciously-installed files (in the /tmp dir, iirc). Tools like ps, top, netstat should help you find the culperate process(es) and get rid of them, but it is important that you find and remove (or update/patch) the software with the original vulnerability that was used to install the crypto miner in the first place.
--
digital man (rob)

Rush quote #57:
He picks up scraps of information, he's adept at adaptation .. Digital Man
Norco, CA WX: 68.5°F, 21.0% humidity, 0 mph NE wind, 0.00 inches rain/24hrs
---
■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net

Ubuntu, Crypto Malware

<637413A1.826.dove-nix@bbses.info>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=18&group=DOVE-Net.Unix#18

  copy link   Newsgroups: DOVE-Net.Unix
From: mro@VERT/BBSESINF (MRO)
To: Android8675
Subject: Ubuntu, Crypto Malware
Message-ID: <637413A1.826.dove-nix@bbses.info>
Date: Tue, 15 Nov 2022 09:33:05 -0600
X-Comment-To: Android8675
Path: rocksolidbbs.com!not-for-mail
Organization: bbses.info
Newsgroups: DOVE-Net.Unix
In-Reply-To: <6373B57C.11215.dove-lnx@vert.synchro.net>
References: <6373B57C.11215.dove-lnx@vert.synchro.net>
X-FTN-PID: Synchronet 3.19b-Win32 master/a2a9dc027 Jan 2 2022 MSC 1928
X-FTN-CHRS: CP437 2
WhenImported: 20221115143517-0800 41e0
WhenExported: 20221115161822-0800 41e0
ExportedFrom: VERT dove-lnx 11218
WhenImported: 20221115163305-0600 4168
WhenExported: 20221115163513-0600 4168
ExportedFrom: BBSESINF dove-nix 826
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: MRO - Tue, 15 Nov 2022 15:33 UTC

Re: Ubuntu, Crypto Malware
By: Android8675 to All on Tue Nov 15 2022 07:51 am

> Hey all, anyone have any experience with crypto infected Linux systems? My
> box that I use has mxrig running, and I've no idea how it got there, where
> it's hiding, or how to get it off my system. Speculating that it could be
> some rootkit bologna, and there's vague suggestions on the googles as to how
> to get it off my system without "nuking it from orbit".
>
> So, before I do that I thought I might see if there's anyone who's had
> experience with this sort of thing who might be willing to take a peek? Drop
> me a note at andyob [at] gmail.com if you've had some experience. I got the
> thing backed up, so I'm ok with letting you pop-on and see if you can work
> some magic.

if you have it backed up, and your backups are clean, just 'nuke it from orbit'.

why do you want to waste time going on a search for it?
if your files are encrypted you aren't getting them back and you might lose
more anyways.

---
■ Synchronet ■ ::: BBSES.info - free BBS services :::

Ubuntu, Crypto Malware

<637421D2.513.dove-unix@palantirbbs.ddns.net>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=19&group=DOVE-Net.Unix#19

  copy link   Newsgroups: DOVE-Net.Unix
From: arelor@VERT/PALANT (Arelor)
To: MRO
Subject: Ubuntu, Crypto Malware
Message-ID: <637421D2.513.dove-unix@palantirbbs.ddns.net>
Date: Tue, 15 Nov 2022 10:33:38 -0600
X-Comment-To: MRO
Path: rocksolidbbs.com!not-for-mail
Organization: Palantir
Newsgroups: DOVE-Net.Unix
In-Reply-To: <637413A1.826.dove-nix@bbses.info>
References: <637413A1.826.dove-nix@bbses.info>
X-FTN-PID: Synchronet 3.19c-Linux master/77e624dd0 Nov 12 2022 GCC 11.2.0
X-FTN-CHRS: CP437 2
WhenImported: 20221115155217-0800 41e0
WhenExported: 20221115161822-0800 41e0
ExportedFrom: VERT dove-lnx 11219
WhenImported: 20221115173338-0600 4168
WhenExported: 20221115175144-0600 4168
ExportedFrom: PALANT dove-unix 513
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Arelor - Tue, 15 Nov 2022 16:33 UTC

Re: Ubuntu, Crypto Malware
By: MRO to Android8675 on Tue Nov 15 2022 04:33 pm

> if you have it backed up, and your backups are clean, just 'nuke it from orbit'.
>
> why do you want to waste time going on a search for it?
> if your files are encrypted you aren't getting them back and you might lose
> more anyways.
>

I think he is talking about cryptomining malware rather than a ransomware piece.

I'd personally just restore from the lattest known clean backup if any, and do what
somebody else has recommended: apply security updates and try to ensure they don't
break in the same way again.

Using Unix utilities from within a compromised system is not a great idea. Rootkits
may make evil software undetectable. If you ust scan an infected system, it is usually
better to just image it and scan the image from a known good system instead.

--
gopher://gopher.richardfalken.com/1/richardfalken

---
■ Synchronet ■ Palantir BBS * palantirbbs.ddns.net * Pensacola, FL

Ubuntu, Crypto Malware

<63744209.828.dove-nix@bbses.info>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=20&group=DOVE-Net.Unix#20

  copy link   Newsgroups: DOVE-Net.Unix
From: mro@VERT/BBSESINF (MRO)
To: Arelor
Subject: Ubuntu, Crypto Malware
Message-ID: <63744209.828.dove-nix@bbses.info>
Date: Tue, 15 Nov 2022 12:51:05 -0600
X-Comment-To: Arelor
Path: rocksolidbbs.com!not-for-mail
Organization: bbses.info
Newsgroups: DOVE-Net.Unix
In-Reply-To: <637421D2.513.dove-unix@palantirbbs.ddns.net>
References: <637421D2.513.dove-unix@palantirbbs.ddns.net>
X-FTN-PID: Synchronet 3.19b-Win32 master/a2a9dc027 Jan 2 2022 MSC 1928
X-FTN-CHRS: CP437 2
WhenImported: 20221115180514-0800 41e0
WhenExported: 20221115221835-0800 41e0
ExportedFrom: VERT dove-lnx 11220
WhenImported: 20221115195105-0600 4168
WhenExported: 20221115200513-0600 4168
ExportedFrom: BBSESINF dove-nix 828
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: MRO - Tue, 15 Nov 2022 18:51 UTC

Re: Ubuntu, Crypto Malware
By: Arelor to MRO on Tue Nov 15 2022 05:33 pm

> I'd personally just restore from the lattest known clean backup if any, and
> do what somebody else has recommended: apply security updates and try to
> ensure they don't break in the same way again.
>
> Using Unix utilities from within a compromised system is not a great idea.
> Rootkits may make evil software undetectable. If you ust scan an infected
> system, it is usually better to just image it and scan the image from a
> known good system instead.
>

if ANY body gets a virus they should:

+ backup any non executable files they need
+ wipe the system.
+ change all your passwords and login names on a clean system, ie NOT that computer.
+ disable remote logins if possible.
+ be more careful!
---
■ Synchronet ■ ::: BBSES.info - free BBS services :::

Ubuntu, Crypto Malware

<63878823.11226.dove-lnx@vert.synchro.net>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=24&group=DOVE-Net.Unix#24

  copy link   Newsgroups: DOVE-Net.Unix
From: android8675@VERT (Android8675)
To: MRO
Subject: Ubuntu, Crypto Malware
Message-ID: <63878823.11226.dove-lnx@vert.synchro.net>
Date: Wed, 30 Nov 2022 01:43:15 -0800
X-Comment-To: MRO
Path: rocksolidbbs.com!not-for-mail
Organization: Vertrauen
Newsgroups: DOVE-Net.Unix
In-Reply-To: <637413A1.826.dove-nix@bbses.info>
References: <637413A1.826.dove-nix@bbses.info>
X-FTN-PID: Synchronet 3.20a-Win32 v320a_dev/55ee6f559 Nov 10 2022 MSC 1922
X-FTN-CHRS: CP437 2
WhenImported: 20221130084315-0800 41e0
WhenExported: 20221130101819-0800 41e0
ExportedFrom: VERT dove-lnx 11226
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Android8675 - Wed, 30 Nov 2022 09:43 UTC

Re: Ubuntu, Crypto Malware
By: MRO to Android8675 on Tue Nov 15 2022 04:33 pm

> if you have it backed up, and your backups are clean, just 'nuke it from
> orbit'.
>
> why do you want to waste time going on a search for it?
> if your files are encrypted you aren't getting them back and you might lose
> more anyways.

Files were fine, it wasn't a malicious app (thankfully), it was just a crypto app was being run from a cloud drive on my system. I blocked off the RADIUS port (1812) and the app stopped coming up. I'll have to figure out how/why it was happening. RADIUS has something to do with authentication. Maybe if I just switch to key auth only it'll block whatever backdoor I've obivously left open.

At any rate, I closed all but the ports I need and it seems OK now.

Glad I didn't have to nuke anything, and thankfully I got a fairly nice backup setup.

---
■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net

Ubuntu, Crypto Malware

<6387845B.2765.dove.dove-nix@realitycheckbbs.org>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=25&group=DOVE-Net.Unix#25

  copy link   Newsgroups: DOVE-Net.Unix
From: android8675@VERT/REALITY (Android8675)
To: Digital Man
Subject: Ubuntu, Crypto Malware
Message-ID: <6387845B.2765.dove.dove-nix@realitycheckbbs.org>
Date: Wed, 30 Nov 2022 01:27:07 -0800
X-Comment-To: Digital Man
Path: rocksolidbbs.com!not-for-mail
Organization: realitycheckBBS
Newsgroups: DOVE-Net.Unix
In-Reply-To: <6373EDB2.11217.dove-lnx@vert.synchro.net>
References: <6373EDB2.11217.dove-lnx@vert.synchro.net>
X-FTN-PID: Synchronet 3.19c-Win32 master/94ea4bf4e May 18 2022 MSC 1929
X-FTN-CHRS: CP437 2
WhenImported: 20221130114452-0800 41e0
WhenExported: 20221130161822-0800 41e0
ExportedFrom: VERT dove-lnx 11227
WhenImported: 20221130082707-0800 41e0
WhenExported: 20221130114448-0800 41e0
ExportedFrom: REALITY dove.dove-nix 2765
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Android8675 - Wed, 30 Nov 2022 09:27 UTC

Re: Ubuntu, Crypto Malware
By: Digital Man to Android8675 on Tue Nov 15 2022 11:51 am

> Re: Ubuntu, Crypto Malware
> By: Android8675 to All on Tue Nov 15 2022 07:51 am

> > Hey all, anyone have any experience with crypto infected Linux systems?

> > So, before I do that I thought I might see if there's anyone who's had
> > experience with this sort of thing who might be willing to take a peek?

> I was running a version of GitLab (a year ago?) that had an exploit
> published and I was vulnerable for about 24 hours before upgrading to a fixe

Is there a simple way to clean out the /tmp folder in Linux, for us phlebs? /var/log folder getting kindda rhobust too)

So I could not for the life of me figure out where the exploit was on my system
until I watched the process carefully. I could kill the process easily enough (sudo top), but it would fire up again within 10-15 minutes. So I watched it fire up and the process information mentioned port 1812 somewhere, and I looked up port 1812 which has something to do with RADIUS authentication?

So I blocked the port on the system and the malware hasn't started up since. I could only guess that the app was being run from a cloud drive somewhere using RADIUS to execute the code locally. I've no idea how that works, and I stopped just after because I was tired, but the problem hasn't returned so I'm OK just keeping that port blocked until I can figure out how/why it's happening.

I might be OK without RADIUS, at least for now. I checked my router settings to make sure no erronious ports were open to the system (originally I had the system on the DMZ, but I figured now would be a good time to lock that down).

At any rate, at least I didn't have to reinstall everything, but at some point I need to update to 22LTS. Something for another day.
--
Android8675@realitycheckbbs.o r g

.... Do you know what kind of game this is?

---
■ Synchronet ■ .: realitycheckbbs.org :: scientia potentia est :.

Ubuntu, Crypto Malware

<6387B4AE.11229.dove-lnx@vert.synchro.net>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=26&group=DOVE-Net.Unix#26

  copy link   Newsgroups: DOVE-Net.Unix
From: digital.man@VERT (Digital Man)
To: Android8675
Subject: Ubuntu, Crypto Malware
Message-ID: <6387B4AE.11229.dove-lnx@vert.synchro.net>
Date: Wed, 30 Nov 2022 04:53:18 -0800
X-Comment-To: Android8675
Path: rocksolidbbs.com!not-for-mail
Organization: Vertrauen
Newsgroups: DOVE-Net.Unix
In-Reply-To: <6387845B.2765.dove.dove-nix@realitycheckbbs.org>
References: <6387845B.2765.dove.dove-nix@realitycheckbbs.org>
X-FTN-PID: Synchronet 3.20a-Linux v320a_dev/5b30c2d10 Nov 11 2022 GCC 12.2.0
X-FTN-CHRS: CP437 2
WhenImported: 20221130115318-0800 41e0
WhenExported: 20221130161822-0800 41e0
ExportedFrom: VERT dove-lnx 11229
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Digital Man - Wed, 30 Nov 2022 12:53 UTC

Re: Ubuntu, Crypto Malware
By: Android8675 to Digital Man on Wed Nov 30 2022 08:27 am

> Re: Ubuntu, Crypto Malware
> By: Digital Man to Android8675 on Tue Nov 15 2022 11:51 am
>
> > Re: Ubuntu, Crypto Malware
> > By: Android8675 to All on Tue Nov 15 2022 07:51 am
>
> > > Hey all, anyone have any experience with crypto infected Linux systems?
>
> > > So, before I do that I thought I might see if there's anyone who's had
> > > experience with this sort of thing who might be willing to take a peek?
>
> > I was running a version of GitLab (a year ago?) that had an exploit
> > published and I was vulnerable for about 24 hours before upgrading to a
> > fixe
>
> Is there a simple way to clean out the /tmp folder in Linux, for us phlebs?

https://askubuntu.com/questions/20783/how-is-the-tmp-directory-cleaned-up

> /var/log folder getting kindda rhobust too)

Most apps that log there should have configurable log rotation policies.

> So I could not for the life of me figure out where the exploit was on my
> system until I watched the process carefully. I could kill the process
> easily enough (sudo top), but it would fire up again within 10-15 minutes.

'sudo ps aux' will display the full path to all running processes. That's how you'd know *where* it is on your system, then you start grepping for what restarts that process upon boot (if it is).
--
digital man (rob)

Synchronet/BBS Terminology Definition #34:
FTN = FidoNet Technology Network
Norco, CA WX: 59.2°F, 68.0% humidity, 0 mph ENE wind, 0.00 inches rain/24hrs
---
■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net

Ubuntu, Crypto Malware

<6387D174.835.dove-nix@bbses.info>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=27&group=DOVE-Net.Unix#27

  copy link   Newsgroups: DOVE-Net.Unix
From: mro@VERT/BBSESINF (MRO)
To: Android8675
Subject: Ubuntu, Crypto Malware
Message-ID: <6387D174.835.dove-nix@bbses.info>
Date: Wed, 30 Nov 2022 08:56:04 -0600
X-Comment-To: Android8675
Path: rocksolidbbs.com!not-for-mail
Organization: bbses.info
Newsgroups: DOVE-Net.Unix
In-Reply-To: <6387845B.2765.dove.dove-nix@realitycheckbbs.org>
References: <6387845B.2765.dove.dove-nix@realitycheckbbs.org>
X-FTN-PID: Synchronet 3.19b-Win32 master/a2a9dc027 Jan 2 2022 MSC 1928
X-FTN-CHRS: CP437 2
WhenImported: 20221130141049-0800 41e0
WhenExported: 20221130161822-0800 41e0
ExportedFrom: VERT dove-lnx 11231
WhenImported: 20221130155604-0600 4168
WhenExported: 20221130161043-0600 4168
ExportedFrom: BBSESINF dove-nix 835
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: MRO - Wed, 30 Nov 2022 14:56 UTC

Re: Ubuntu, Crypto Malware
By: Android8675 to Digital Man on Wed Nov 30 2022 08:27 am

> I could only guess that the app was being run from a cloud drive somewhere
> using RADIUS to execute the code locally. I've no idea how that works, and I
> stopped just after because I was tired, but the problem hasn't returned so
> I might be OK without RADIUS, at least for now. I checked my router settings
> to make sure no erronious ports were open to the system (originally I had
> the system on the DMZ, but I figured now would be a good time to lock that
> down).
>
> At any rate, at least I didn't have to reinstall everything, but at some
> point I need to update to 22LTS. Something for another day.

you really should reinstall. they didnt exploit radius.
and it's good practice and keeps you on your toes to learn a way
to tear it down and put it up again after working out a system.

i wouldn't trust running an exploited system.

---
■ Synchronet ■ ::: BBSES.info - free BBS services :::

Ubuntu, Crypto Malware

<638E3C24.366.dv-dove-nix@shodanscore.com>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=28&group=DOVE-Net.Unix#28

  copy link   Newsgroups: DOVE-Net.Unix
From: android8675@VERT/SHODAN (Android8675)
To: Digital Man
Subject: Ubuntu, Crypto Malware
Message-ID: <638E3C24.366.dv-dove-nix@shodanscore.com>
Date: Mon, 5 Dec 2022 03:44:52 -0800
X-Comment-To: Digital Man
Path: rocksolidbbs.com!not-for-mail
Organization: SHODANs Core
Newsgroups: DOVE-Net.Unix
In-Reply-To: <6387B4AE.11229.dove-lnx@vert.synchro.net>
References: <6387B4AE.11229.dove-lnx@vert.synchro.net>
X-FTN-PID: Synchronet 3.19c-Linux master/872bfda29 Dec 5 2022 GCC 9.4.0
X-FTN-CHRS: CP437 2
WhenImported: 20221205124744-0800 41e0
WhenExported: 20221205161815-0800 41e0
ExportedFrom: VERT dove-lnx 11233
WhenImported: 20221205104452-0800 41e0
WhenExported: 20221205124744-0800 41e0
ExportedFrom: SHODAN dv-dove-nix 366
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Android8675 - Mon, 5 Dec 2022 11:44 UTC

Re: Ubuntu, Crypto Malware
By: Digital Man to Android8675 on Wed Nov 30 2022 11:53 am

> Re: Ubuntu, Crypto Malware
> By: Android8675 to Digital Man on Wed Nov 30 2022 08:27 am
>
> > Is there a simple way to clean out the /tmp folder in Linux, for us phlebs?
>
> https://askubuntu.com/questions/20783/how-is-the-tmp-directory-cleaned-up
>

Thanks...

> > /var/log folder getting kindda rhobust too)
>
> Most apps that log there should have configurable log rotation policies.
>

Thanks again, will research...

> > So I could not for the life of me figure out where the exploit was on my system until I watched the process
>
> 'sudo ps aux' will display the full path to all running processes. That's how you'd know *where* it is on your
> system, then you start grepping for what restarts that process upon boot (if it is).

I'll need to practice this. I find it odd that port 1812 isn't open in my router, so maybe there is another system infected causing this? Probably those fucking wifi lightbulbs I installed last week or some bullshit.

ha, thanks for your help DM.
--
Android8675@ShodansCore
---
■ Synchronet ■ Shodan's Core @ ShodansCore.com

Ubuntu, Crypto Malware

<638E3C50.367.dv-dove-nix@shodanscore.com>

  copy mid

https://www.rocksolidbbs.com/dovenet/article-flat.php?id=29&group=DOVE-Net.Unix#29

  copy link   Newsgroups: DOVE-Net.Unix
From: android8675@VERT/SHODAN (Android8675)
To: MRO
Subject: Ubuntu, Crypto Malware
Message-ID: <638E3C50.367.dv-dove-nix@shodanscore.com>
Date: Mon, 5 Dec 2022 03:45:36 -0800
X-Comment-To: MRO
Path: rocksolidbbs.com!not-for-mail
Organization: SHODANs Core
Newsgroups: DOVE-Net.Unix
In-Reply-To: <6387D174.835.dove-nix@bbses.info>
References: <6387D174.835.dove-nix@bbses.info>
X-FTN-PID: Synchronet 3.19c-Linux master/872bfda29 Dec 5 2022 GCC 9.4.0
X-FTN-CHRS: CP437 2
WhenImported: 20221205124744-0800 41e0
WhenExported: 20221205161815-0800 41e0
ExportedFrom: VERT dove-lnx 11234
WhenImported: 20221205104536-0800 41e0
WhenExported: 20221205124744-0800 41e0
ExportedFrom: SHODAN dv-dove-nix 367
Content-Type: text/plain; charset=IBM437
Content-Transfer-Encoding: 8bit
 by: Android8675 - Mon, 5 Dec 2022 11:45 UTC

Re: Ubuntu, Crypto Malware
By: MRO to Android8675 on Wed Nov 30 2022 03:56 pm

> you really should reinstall. they didnt exploit radius.
> and it's good practice and keeps you on your toes to learn a way
> to tear it down and put it up again after working out a system.
>
> i wouldn't trust running an exploited system.

I am seriously considering it. Just need to find the time.
--
Android8675@ShodansCore
---
■ Synchronet ■ Shodan's Core @ ShodansCore.com

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor