From owner-freebsd-security Wed Aug 1 8:59:32 2001 Delivered-To: freebsd-security@freebsd.org Received: from internethelp.ru (wh.internethelp.ru [212.113.112.145]) by hub.freebsd.org (Postfix) with ESMTP id 61E1637B405 for ; Wed, 1 Aug 2001 08:59:26 -0700 (PDT) (envelope-from nkritsky@internethelp.ru) Received: from IBMKA (ibmka.internethelp.ru. [192.168.0.6]) by internethelp.ru (8.9.3/8.9.3) with ESMTP id TAA60499; Wed, 1 Aug 2001 19:59:21 +0400 (MSD) Date: Wed, 1 Aug 2001 19:58:53 +0400 From: "Nickolay A.Kritsky" X-Mailer: The Bat! (v1.49) Personal Reply-To: "Nickolay A.Kritsky" Organization: IHelp X-Priority: 3 (Normal) Message-ID: <172110747676.20010801195853@internethelp.ru> To: "Maximum" Cc: freebsd-security@FreeBSD.ORG Subject: Re: Trojan injected in my Freebsd 4.1-RELEASE In-reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Hello Maximum, Wednesday, August 01, 2001, 6:24:17 PM, you wrote: M> Hi everybody, M> today I've got security report from my FreeBSD box that some suid files changed. That was /usr/bin/netstat, /usr/bin/fstat and /usr/bin/quote. M> Using chkproc programm from Nelson Murilo found at pangeia.com.br I found one stealth process. Running clean ps command i found ssh daemon sshd daemon named 'swapper' in process list. This daemon M> is attached to 50505 port. Also i found directory with other hacker's scripts and one of them contained full list of changed binaries M> that was : ps,ls,netstat,fstat,ldconfig and telnetd Looks strange to me. The list of changed setuid binaries is not the same,as in your security report. You should better check this out. How do you know, that ps wasn't trojaned, when you ran it? I suggest you to write a CD-R with the clean binaries you can need in your work, mount it as ~/trash and add ~/tradh in your $PATH variable M> Examining logs I had not found any records about visit of hacker. Wtmp was cleared 5 hours back from time of created hackers scripts. M> I'm going not only remove this trojan from my box, but find from where attack was made and the way attack was made. M> Now I wrote small script that will run clean netstat and grep from output any connections to 50505 port and telnet port. This scripth I had included in my crontab and cron runs it every minute. M> This way I hope to find from where that man connects to me. M> Do you have any other suggestions to help me find how hacker injected trojan ? If the traffic to this box is not very large I would place some sniffer between Internet and vulnerable box. Logging all packets can help. M> In one of shell script I'm talking about i found copyright mark "nrfbsdrk v0.1 by gREMLiNs". Try running chkrootkit on it ( /usr/ports/security/chkrootkit ). M> Thank you. M> Maxim Sorokin M> To Unsubscribe: send mail to majordomo@FreeBSD.org M> with "unsubscribe freebsd-security" in the body of the message Good luck ;------------------------------------------- ; NKritsky ; SysAdmin InternetHelp.Ru ; http://www.internethelp.ru ; mailto:nkritsky@internethelp.ru To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message