am I hacked?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

I was not reading my system logs regularly (that's bad!). Today I noticed the following:

----------
Rootkit Hunter 1.2.8 is running
Sat, 21 Apr 2007 13:30:40 +0300
Determining OS... Ready


Checking binaries
* Selftests
    Strings (command)                                        [ OK ]


* System tools
Info: prelinked files found
 Performing 'known good' check...
  /bin/cat                                                   [ BAD ]
  /bin/chmod                                                 [ BAD ]
  /bin/chown                                                 [ BAD ]
  /bin/date                                                  [ BAD ]
  /bin/dmesg                                                 [ BAD ]
  /bin/env                                                   [ BAD ]
  /bin/grep                                                  [ BAD ]
  /bin/kill                                                  [ BAD ]
  /bin/login                                                 [ BAD ]
  /bin/ls                                                    [ BAD ]
  /bin/more                                                  [ BAD ]
  /bin/mount                                                 [ BAD ]
  /bin/netstat                                               [ BAD ]
  /bin/ps                                                    [ BAD ]
  /bin/su                                                    [ BAD ]
  /sbin/chkconfig                                            [ BAD ]
  /sbin/depmod                                               [ BAD ]
  /sbin/ifconfig                                             [ BAD ]
  /sbin/init                                                 [ BAD ]
  /sbin/insmod                                               [ BAD ]
  /sbin/ip                                                   [ BAD ]
  /sbin/lsmod                                                [ BAD ]
  /sbin/modinfo                                              [ BAD ]
  /sbin/modprobe                                             [ BAD ]
  /sbin/rmmod                                                [ BAD ]
  /sbin/runlevel                                             [ BAD ]
  /sbin/sulogin                                              [ BAD ]
  /sbin/sysctl                                               [ BAD ]
  /sbin/syslogd                                              [ BAD ]
  /usr/bin/chattr                                            [ BAD ]
  /usr/bin/du                                                [ BAD ]
  /usr/bin/file                                              [ BAD ]
  /usr/bin/find                                              [ BAD ]
  /usr/bin/head                                              [ BAD ]
  /usr/bin/killall                                           [ BAD ]
  /usr/bin/lsattr                                            [ BAD ]
  /usr/bin/passwd                                            [ BAD ]
  /usr/bin/pstree                                            [ BAD ]
  /usr/bin/sha1sum                                           [ BAD ]
  /usr/bin/stat                                              [ BAD ]
  /usr/bin/top                                               [ BAD ]
  /usr/bin/users                                             [ BAD ]
  /usr/bin/vmstat                                            [ BAD ]
  /usr/bin/w                                                 [ BAD ]
  /usr/bin/watch                                             [ BAD ]
  /usr/bin/wc                                                [ BAD ]
  /usr/bin/wget                                              [ BAD ]
  /usr/bin/whereis                                           [ BAD ]
  /usr/bin/who                                               [ BAD ]
  /usr/bin/whoami                                            [ BAD ]
--------------------------------------------------------------------------------
Rootkit Hunter found some bad or unknown hashes. This can be happen due replaced binaries or updated packages (which give other hashes). Be sure your hashes are fully updated (rkhunter --update). If you're in doubt about these hashes, contact
the author (fill in the contact form).
--------------------------------------------------------------------------------

[Press <ENTER> to continue]



Check rootkits
* Default files and directories
  Rootkit '55808 Trojan - Variant A'...                      [ OK ]
  ADM Worm...                                                [ OK ]
  Rootkit 'AjaKit'...                                        [ OK ]
  Rootkit 'aPa Kit'...                                       [ OK ]
  Rootkit 'Apache Worm'...                                   [ OK ]
  Rootkit 'Ambient (ark) Rootkit'...                         [ OK ]
  Rootkit 'Balaur Rootkit'...                                [ OK ]
  Rootkit 'BeastKit'...                                      [ OK ]
  Rootkit 'beX2'...                                          [ OK ]
  Rootkit 'BOBKit'...                                        [ OK ]
  Rootkit 'CiNIK Worm (Slapper.B variant)'...                [ OK ]
  Rootkit 'Danny-Boy's Abuse Kit'...                         [ OK ]
  Rootkit 'Devil RootKit'...                                 [ OK ]
  Rootkit 'Dica'...                                          [ OK ]
  Rootkit 'Dreams Rootkit'...                                [ OK ]
  Rootkit 'Duarawkz'...                                      [ OK ]
  Rootkit 'Flea Linux Rootkit'...                            [ OK ]
  Rootkit 'FreeBSD Rootkit'...                               [ OK ]
  Rootkit 'Fuck`it Rootkit'...                               [ OK ]
  Rootkit 'GasKit'...                                        [ OK ]
  Rootkit 'Heroin LKM'...                                    [ OK ]
  Rootkit 'HjC Kit'...                                       [ OK ]
  Rootkit 'ignoKit'...                                       [ OK ]
  Rootkit 'ImperalsS-FBRK'...                                [ OK ]
  Rootkit 'Irix Rootkit'...                                  [ OK ]
  Rootkit 'Kitko'...                                         [ OK ]
  Rootkit 'Knark'...                                         [ OK ]
  Rootkit 'Li0n Worm'...                                     [ OK ]
  Rootkit 'Lockit / LJK2'...                                 [ OK ]
  Rootkit 'MRK'...                                           [ OK ]
  Rootkit 'Ni0 Rootkit'...                                   [ OK ]
  Rootkit 'RootKit for SunOS / NSDAP'...                     [ OK ]
  Rootkit 'Optic Kit (Tux)'...                               [ OK ]
  Rootkit 'Oz Rootkit'...                                    [ OK ]
  Rootkit 'Portacelo'...                                     [ OK ]
  Rootkit 'R3dstorm Toolkit'...                              [ OK ]
  Rootkit 'RH-Sharpe's rootkit'...                           [ OK ]
  Rootkit 'RSHA's rootkit'...                                [ OK ]
  Sebek LKM                                                  [ OK ]
  Rootkit 'Scalper Worm'...                                  [ OK ]
  Rootkit 'Shutdown'...                                      [ OK ]
  Rootkit 'SHV4'...                                          [ OK ]
  Rootkit 'SHV5'...                                          [ OK ]
  Rootkit 'Sin Rootkit'...                                   [ OK ]
  Rootkit 'Slapper'...                                       [ OK ]
  Rootkit 'Sneakin Rootkit'...                               [ OK ]
  Rootkit 'Suckit Rootkit'...                                [ OK ]
  Rootkit 'SunOS Rootkit'...                                 [ OK ]
  Rootkit 'Superkit'...                                      [ OK ]
  Rootkit 'TBD (Telnet BackDoor)'...                         [ OK ]
  Rootkit 'TeLeKiT'...                                       [ OK ]
  Rootkit 'T0rn Rootkit'...                                  [ OK ]
  Rootkit 'Trojanit Kit'...                                  [ OK ]
  Rootkit 'Tuxtendo'...                                      [ OK ]
  Rootkit 'URK'...                                           [ OK ]
  Rootkit 'VcKit'...                                         [ OK ]
  Rootkit 'Volc Rootkit'...                                  [ OK ]
  Rootkit 'X-Org SunOS Rootkit'...                           [ OK ]
  Rootkit 'zaRwT.KiT Rootkit'...                             [ OK ]

* Suspicious files and malware
  Scanning for known rootkit strings                         [ OK ]
  Scanning for known rootkit files                           [ OK ]
  Testing running processes...                               [ OK ]
  Miscellaneous Login backdoors                              [ OK ]
  Miscellaneous directories                                  [ OK ]
  Software related files                                     [ OK ]
  Sniffer logs                                               [ OK ]

[Press <ENTER> to continue]


* Trojan specific characteristics
  shv4
    Checking /etc/rc.d/rc.sysinit
      Test 1                                                 [ Clean ]
      Test 2                                                 [ Clean ]
      Test 3                                                 [ Clean ]
    Checking /etc/inetd.conf                                 [ Not found ]
    Checking /etc/xinetd.conf                                [ Skipped ]

* Suspicious file properties
  chmod properties
    Checking /bin/ps                                         [ Clean ]
    Checking /bin/ls                                         [ Clean ]
    Checking /usr/bin/w                                      [ Clean ]
    Checking /usr/bin/who                                    [ Clean ]
    Checking /bin/netstat                                    [ Clean ]
    Checking /bin/login                                      [ Clean ]
  Script replacements
    Checking /bin/ps                                         [ Clean ]
    Checking /bin/ls                                         [ Clean ]
    Checking /usr/bin/w                                      [ Clean ]
    Checking /usr/bin/who                                    [ Clean ]
    Checking /bin/netstat                                    [ Clean ]
    Checking /bin/login                                      [ Clean ]

* OS dependant tests

  Linux
    Checking loaded kernel modules...                        [ OK ]
    Checking files attributes                                [ OK ]
    Checking LKM module path                                 [ OK ]


Networking
* Check: frequently used backdoors
 Port 2001: Scalper Rootkit                                  [ OK ]
 Port 2006: CB Rootkit                                       [ OK ]
 Port 2128: MRK                                              [ OK ]
 Port 14856: Optic Kit (Tux)                                 [ OK ]
 Port 47107: T0rn Rootkit                                    [ OK ]
 Port 60922: zaRwT.KiT                                       [ OK ]

* Interfaces
    Scanning for promiscuous interfaces                      [ OK ]

[Press <ENTER> to continue]



System checks
* Allround tests
  Checking hostname... Found. Hostname is hst-1-98.siriusbg.com
  Checking for passwordless user accounts... OK
  Checking for differences in user accounts... OK. No changes.
  Checking for differences in user groups... OK. No changes.
  Checking boot.local/rc.local file...
    - /etc/rc.local                                          [ OK ]
    - /etc/rc.d/rc.local                                     [ OK ]
    - /usr/local/etc/rc.local                                [ Not found ]
    - /usr/local/etc/rc.d/rc.local                           [ Not found ]
    - /etc/conf.d/local.start                                [ Not found ]
    - /etc/init.d/boot.local                                 [ Not found ]
  Checking rc.d files...
    Processing........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ........................................
              ....................................
  Result rc.d files check                                    [ OK ]
  Checking history files
    Bourne Shell                                             [ OK ]

* Filesystem checks
  Checking /dev for suspicious files...                      [ OK ]
  Scanning for hidden files...                               [ Warning! ]
---------------
/dev/.udev  /etc/.pwd.lock
---------------
Please inspect:  /dev/.udev (directory)

[Press <ENTER> to continue]



Application advisories
* Application scan
  Checking Apache2 modules ...                               [ Not found ]
  Checking Apache configuration ...                          [ OK ]


Security advisories
* Check: Groups and Accounts
  Searching for /etc/passwd...                               [ Found ]
  Checking users with UID '0' (root)...                      [ OK ]

* Check: SSH
  Searching for sshd_config...
  Found /etc/ssh/sshd_config
Checking for allowed root login... [ OK (Remote root login disabled) ] Checking for allowed protocols... [ OK (Only SSH2 allowed) ]

* Check: Events and Logging
  Search for syslog configuration...                         [ OK ]
  Checking for running syslog slave...                       [ OK ]
Checking for logging to remote system... [ OK (no remote logging) ]

[Press <ENTER> to continue]



---------------------------- Scan results ----------------------------

MD5
MD5 compared: 50
Incorrect MD5 checksums: 50

File scan
Scanned files: 342
Possible infected files: 0

Application scan
Scanning took 905 seconds

------------------- Sat, 21 Apr 2007 13:45:45 +0300 -------------------

Do you have some problems, undetected rootkits, false positives, ideas
or suggestions?
Please e-mail me by filling in the contact form (@http://www.rootkit.nl)

-----------------------------------------------------------------------

In the logs I found exactly the same results since one month ago.

Does that mean I have been hacked and all those binaries are replaced?
The secure logs are full with unaccepted ssh connections. The only successful connections for this period are from a known IP, but unfortunately I have no older logs.

Thanks for any clues!

Regards,
Peter
home site:  http://bgwebdeveloper.com


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux