Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps - Status | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. Spamhaus detects contact to malware C&C server - Can´t find anything in the logs -

Spamhaus detects contact to malware C&C server - Can´t find anything in the logs -

Scheduled Pinned Locked Moved Solved Support
15 Posts 5 Posters 4.7k Views 5 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • whitespaceW Offline
    whitespaceW Offline
    whitespace
    wrote on last edited by
    #2

    In the meantime I was able to delist from Spamhaus. I generally hope for a false negative but can´t rely solely on hope. So the question still holds up. How to detect potential bot-contacting malware on a Cloudron server?

    girishG 1 Reply Last reply
    0
    • whitespaceW whitespace

      In the meantime I was able to delist from Spamhaus. I generally hope for a false negative but can´t rely solely on hope. So the question still holds up. How to detect potential bot-contacting malware on a Cloudron server?

      girishG Offline
      girishG Offline
      girish
      Staff
      wrote on last edited by
      #3

      @whitespace you can try running a clamav scan. So far, it has never detected anything for me, so I have no idea how effective it is. Basically, apt-get install clamav and then later clamscan --infected --detect-pua=yes --recursive <somepath> . It takes forever but let's see if it detects something in yours.

      You will see summary like so:

      ----------- SCAN SUMMARY -----------
      Known viruses: 8686492
      Engine version: 0.103.8
      Scanned directories: 161
      Scanned files: 91
      Infected files: 0
      Data scanned: 9.51 MB
      Data read: 3.70 MB (ratio 2.57:1)
      Time: 28.475 sec (0 m 28 s)
      Start Date: 2023:07:20 07:01:11
      End Date:   2023:07:20 07:01:40
      
      1 Reply Last reply
      0
      • girishG Offline
        girishG Offline
        girish
        Staff
        wrote on last edited by
        #4

        Do you run any other software other than Cloudron on the server btw?

        whitespaceW 1 Reply Last reply
        0
        • girishG girish

          Do you run any other software other than Cloudron on the server btw?

          whitespaceW Offline
          whitespaceW Offline
          whitespace
          wrote on last edited by
          #5

          @girish Nope. Just a clean Ubuntu and a cloudron install on top. Nothing else. The only installations are cloudron applications. Nextcloud, Uptime Kuma, a few LAMP stacks, three WP instances, a FreshRSS instance, an unused Mastodon instance, Joplin. No custom docker repo or anything alike.

          1 Reply Last reply
          0
          • necrevistonnezrN Offline
            necrevistonnezrN Offline
            necrevistonnezr
            wrote on last edited by
            #6

            What software is running in the LAMP stacks?

            whitespaceW 1 Reply Last reply
            0
            • necrevistonnezrN necrevistonnezr

              What software is running in the LAMP stacks?

              whitespaceW Offline
              whitespaceW Offline
              whitespace
              wrote on last edited by
              #7

              @necrevistonnezr None other than what the stack comes with. I use the LAMP stacks solely for static site delivery by populating the public directory.

              1 Reply Last reply
              0
              • whitespaceW Offline
                whitespaceW Offline
                whitespace
                wrote on last edited by whitespace
                #8

                News.

                My server provider got an email from Bitninja Security. They have more than hundred logs.

                Here some examples:

                Deleted code for privacy reasons and since issue is solved. 
                

                Is there any concrete indication of anything?

                1 Reply Last reply
                0
                • necrevistonnezrN Offline
                  necrevistonnezrN Offline
                  necrevistonnezr
                  wrote on last edited by
                  #9

                  At least

                  <string>wp.getUsersBlogs</string>
                  

                  in both logs points to Wordpress, I think.

                  1 Reply Last reply
                  0
                  • KubernetesK Offline
                    KubernetesK Offline
                    Kubernetes
                    App Dev
                    wrote on last edited by
                    #10

                    I have the impression that 99% of all suspicious activity are because of wordpress... just wondering

                    1 Reply Last reply
                    0
                    • imc67I Offline
                      imc67I Offline
                      imc67
                      translator
                      wrote on last edited by
                      #11

                      Did you changed the default admin/changeme after install?
                      Advise: always install Wordfence (the free version had enough)

                      whitespaceW 1 Reply Last reply
                      0
                      • imc67I imc67

                        Did you changed the default admin/changeme after install?
                        Advise: always install Wordfence (the free version had enough)

                        whitespaceW Offline
                        whitespaceW Offline
                        whitespace
                        wrote on last edited by whitespace
                        #12

                        I understand the log entry as what the infected server does to other servers as part of a bot net. In this case it looks for Wordpress instances? In fact it seems to try and populate the sites with what seems to be pretty generic login data. I am not sure this is an indication that it has to do with WP. Right now all WP instances are turned off.

                        value><string>lotadmin</string></value><value><string>12345</string>
                        
                        1 Reply Last reply
                        0
                        • whitespaceW Offline
                          whitespaceW Offline
                          whitespace
                          wrote on last edited by whitespace
                          #13

                          I found it. The log entries listed by Bitninja Security are found on the log of a WordPress instance that has been left with default values. Wasn´t me.

                          I am ditching the WP instance.

                          Jesus Christ.

                          1 Reply Last reply
                          0
                          • necrevistonnezrN Offline
                            necrevistonnezrN Offline
                            necrevistonnezr
                            wrote on last edited by necrevistonnezr
                            #14

                            General Rule in Life: it‘s always efffin‘ Wordpress 😉
                            Not because it’s a bad product per se, but one of the most used on the web. Attracts all the assh*les in the world.

                            1 Reply Last reply
                            0
                            • girishG Offline
                              girishG Offline
                              girish
                              Staff
                              wrote on last edited by girish
                              #15

                              I think we have to 100% move to auto-generated passwords for the initial user in apps from the next release. We will make this a priority.

                              1 Reply Last reply
                              4
                              • girishG girish marked this topic as a question on
                              • girishG girish has marked this topic as solved on

                              Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                              Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                              With your input, this post could be even better 💗

                              Register Login
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • Bookmarks
                              • Search