Re: SSH1 CRC32 Compensation Attacks

From: Armando Ortiz (aortizat_private)
Date: Mon Dec 10 2001 - 12:15:48 PST

  • Next message: Ian O'Brien: "Re: CodeRed back with with a vengence this month!"

    Upon further investigation of the compromise, I did discover another
    nifty little thing:
    
    This person, be it a root kit or an actual individual that did it, added
    a password to our user "mail" account.
    
    I'm guessing that in the event of a patch being applied to the server
    where all trojans were removed, the user "mail" could login.
    
    This was found in the /etc/shadow file.
    
    The user "mail" should not have a password as far as I'm aware.
    
    Regards.
    
    On Sun, 2001-12-09 at 07:36, Armando B. Ortiz wrote:
    > The attacks apparently took down two of our servers in a 4-server
    > webfarm.  They apparently leave the typical root kits and
    > compromised/trojaned binaries.
    > 
    > Unfortunately, I can't recover the other boxes and have to rebuild
    > them.  The intruder left compromised files relating to the operation of
    > SSH as well as a trojaned SSH daemon.
    > 
    > =:(
    
    -- 
    -----------------------------------------------------------------
     From the Linux Box of Armando Ortiz
                           System Administrator
                           OnLineTraffic.com
     Email:  aortizat_private
     Download my public key from:
      ftp://209.185.214.98/pub/pubkeys/aortizat_private
       or retrieve it from
      http://www.keyserver.net as aortizat_private
                                 (Public Key expires 01/04/2002)
           All emails from me are signed by this public key.
    -----------------------------------------------------------------
    
    
    



    This archive was generated by hypermail 2b30 : Mon Dec 10 2001 - 13:30:51 PST