Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. How to Identify which application is infected from an abuse report.

How to Identify which application is infected from an abuse report.

Scheduled Pinned Locked Moved Solved Support
abuse-reportfirewall
4 Posts 3 Posters 349 Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Offline
    S Offline
    sp121
    wrote on last edited by joseph
    #1

    Hi,

    We have cloudron installed on a dedicated server. I got this message from my ISP as a complaint of abuse:


    I am XXX , Incident Analyst at BitNinja Server Security.
    I'm writing to inform you that we have detected malicious requests targeting our clients servers from the IP xxx.xxx.xxx.xxx you own based on a public database.
    We've been able to stop these requests and prevent future attacksby adding your IP to our greylist, but we wanted to reach out and inform you, as you might not be aware.


    They could see many attempts like below. I believe it's some kind on worm that might be on one of the apps installed (inclining towards one of the Wordpress installation).

    This is one of the many logs from BitNinja's portal :


    Example 1 :


    Stopped by: CAPTCHA - Web

    Time of catch: 2024-09-30 xx:xx:xx

    Incident content:

    Url: bi###er.se/wp-login.php
    Remote connection: xxx.xxx.xxx.xxx:41808
    Headers: {
    "Host": "bi###er.se",
    "User-Agent": "Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0",
    "Content-Length": "103",
    "Content-Type": "application/x-www-form-urlencoded",
    "Accept-Encoding": "gzip",
    "Connection": "close",
    "BN-Frontend": "captcha-https",
    "X-Forwarded-Port": "443",
    "X-Forwarded-Proto": "https",
    "BN-Client-Port": "40074",
    "X-Forwarded-For": "xxx.xxx.xxx.xxx"
    }
    Post data: {
    "log": "wwwadmin",
    "pwd": "[hidden]",
    "wp-submit": "Log In",
    "redirect_to": "https://bi###er.se/wp-admin/",
    "testcookie": "1"
    }


    Example 2:


    Stopped by: CAPTCHA - Web

    Time of catch: 2024-09-30 01:53:39

    Incident content:

    Url: on###en.se/xmlrpc.php
    Remote connection: XXX.XXX.XXX.XXX:39598
    Headers: {
    "Host": "on###en.se",
    "User-Agent": "Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0",
    "Content-Length": "480",
    "Content-Type": "application/x-www-form-urlencoded",
    "Accept-Encoding": "gzip",
    "Connection": "close",
    "BN-Frontend": "captcha-https",
    "X-Forwarded-Port": "443",
    "X-Forwarded-Proto": "https",
    "BN-Client-Port": "41228",
    "X-Forwarded-For": "XXX.XXX.XXX.XXX"
    }
    Post data: {
    "<?xml_version": ""1.0"?><methodCall><methodName>system.multicall</methodName><params><param><value><array><data><value><struct><member><name>methodName</name><value><string>wp.getUsersBlogs</string></value></member><member><name>params</name><value><array><data><value><array><data><value><string>admin</string></value><value><string>blogger</string></value></data></array></value></data></array></value></member></struct></value></data></array></value></param></params></methodCall>"
    }


    The question is, how do we identify which application does this log correspond to?
    Also, if there is a security / monitoring tool you would recommend for cloudron to prevent or detect such activities.

    Thank you !

    1 Reply Last reply
    1
    • J joseph marked this topic as a question on
    • J Offline
      J Offline
      joseph
      Staff
      wrote on last edited by
      #2

      @sp121 mm. It is quite hard to track outbound requests because these are not logged by anything (atleast, incoming stuff can be logged by nginx).

      1 Reply Last reply
      0
      • J Offline
        J Offline
        joseph
        Staff
        wrote on last edited by
        #3

        All my searches lead to dead ends. Like https://serverfault.com/questions/643616/best-way-to-trace-outgoing-requests-from-a-server and https://www.reddit.com/r/sysadmin/comments/384q3b/my_server_was_just_suspended_because_of_a/ .

        @sp121 do you have a cloud firewall ? One recommendation is to stop all outbound traffic altogether. Most apps don't need to make outbound requests anyway. Slowly start whitelisting outbound traffic. Is this an option?

        1 Reply Last reply
        0
        • jamesJ Offline
          jamesJ Offline
          james
          Staff
          wrote last edited by
          #4

          Closed due to inactivity

          1 Reply Last reply
          0
          • jamesJ james has marked this topic as solved
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Don't have an account? Register

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • Bookmarks
          • Search