On Wed, Apr 03, 2019 at 06:56:39PM +0000, Cord wrote:
> I have some heavy suspect that my openbsd box was been hacked for the second 
> time in few weeks. The first time was been some weeks ago, I have got some 
> suspects and after few checks I have found that someone was been connected to 
> my vps via ssh on a non-standard port using my ssh key. The connection came 
> from a tor exit node. There were been 2 connections and up since 5 days. Now 
> I have some other new suspects because some private email seems knew from 
> others. Also I have found other open sessions on the web gui of my email 
> provider, but I am abolutely sure I have done the logout always.

If you see ssh sessions that shouldn't be there, kill those sessions. 

Then before they log in again, do whatever changes are required such as 
generating 
new keys, changing your password or similar, and of course clean up your sshd 
config. 

>From your (not very precise) description it could even be that a separate set 
>of 
binaries have been installed in addition to the system sshd. Look for those 
too. 

Basically, do not trust your system as it is. Wipe, reinstall and rebuild 
should be an option.

For the webmail access, do change your password and if they support it, look 
into 
any multi-factor authentication options.

Moving forward, learn how to read and interpret logs and for that matter packet 
captures. 

The information you have offered up does not give any indication how the 
suspected
attackers got hold of enough information to get access (if indeed it is what 
happened).

That information could possibly be found in your logs, but in my experience it 
is far
more likely that somebody with access to the system made some stupid mistake 
such
as clicking a link in a mailed webpage, speaking their password out loud within
hearing distance of somebody with enough context information to be able to use 
it,
or something else equally cringeworthy. Then your logs would only show a 
successful
login, perhaps from somewhere unexpected, as the start of the compromise.

I hope some of this stream of semi-random items is of some use.

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to