VDS hacked by an attacker.

Ask questions about dedicated servers here and we and other users will do our best to answer them. Please also refer to the self-help section for tutorials and answers to the most commonly asked questions.
Post Reply
preben
A regular
A regular
Posts: 33
https://www.youtube.com/channel/UC40BgXanDqOYoVCYFDSTfHA
Joined: Fri Dec 05, 2014 2:14 pm

VDS hacked by an attacker.

Post by preben »

Sorry about making another thread.

Today i was on the VDS and a message pops up that someone else has connected, and it kicked me off each time i tried to reconnect.

All i have done is enable FTP for filezilla and webhosting, could it be any of those? I find it really frustrating, the attacker even closed my server and opened Server manager but i don't think he did anything, he is no longer trying to connect.

I have stopped the running process webhosting in servermanager.

:evil:
Image
preben
A regular
A regular
Posts: 33
Joined: Fri Dec 05, 2014 2:14 pm

Re: VDS hacked by an attacker.

Post by preben »

I also had WAMP, and XAMPP.

I uninstalled both of those.
Image
User avatar
soja
This is my homepage
This is my homepage
Posts: 2389
Joined: Fri May 18, 2012 3:20 pm

Re: VDS hacked by an attacker.

Post by soja »

The message occurs when someone has your remote desktop password and tries to log in.

In your control panel, block all traffic to port 3389.
Log in to your VDS using VNC.
Change your windows user password.
Remove the firewall rule.

Have you added anyone else to the control panel? They may have been connecting without your knowledge.
Not a NFO employee
preben
A regular
A regular
Posts: 33
Joined: Fri Dec 05, 2014 2:14 pm

Re: VDS hacked by an attacker.

Post by preben »

I went to nfo servers control panel > firewall but i didn't see an option to block that specific port.

I'm changing the admin password right now.

I connected with VNC, and i see another user here.
Image
Image
User avatar
soja
This is my homepage
This is my homepage
Posts: 2389
Joined: Fri May 18, 2012 3:20 pm

Re: VDS hacked by an attacker.

Post by soja »

You would need to create your own rule to block that port.

Example: Attached

You will also need to delete that user account while the port is blocked if it should not be there.
Attachments
firewall.png
Not a NFO employee
preben
A regular
A regular
Posts: 33
Joined: Fri Dec 05, 2014 2:14 pm

Re: VDS hacked by an attacker.

Post by preben »

Hi, i just logged into the attackers account on my VDS.

And he's doing something with WAMP one of the softwares i installed.

inside the index.php there's some encrypted text.

Image
Image
User avatar
Edge100x
Founder
Founder
Posts: 12948
Joined: Thu Apr 18, 2002 11:04 pm
Location: Seattle
Contact:

Re: VDS hacked by an attacker.

Post by Edge100x »

This is a good reminder to everyone not to install WAMP or XAMPP on a production server unless you really know what you're doing (and if you do know what you're doing.. you should be installing the applications directly anyway). We see far too many people who are immediately exploited like this when they do it.

You should back up your files and perform a wipe.
preben
A regular
A regular
Posts: 33
Joined: Fri Dec 05, 2014 2:14 pm

Re: VDS hacked by an attacker.

Post by preben »

I didn't know this could happen just by installing a software.

I uninstalled both WAMP server and XAMP i wanted to try host a website that's why i installed them.

I uninstalled and changed password, am i safe now?
Anything i should turn off in server manager?

Anything else i should do.
Image
User avatar
soja
This is my homepage
This is my homepage
Posts: 2389
Joined: Fri May 18, 2012 3:20 pm

Re: VDS hacked by an attacker.

Post by soja »

Your safest bet would be to do as John suggested, and backup your game servers and do a reinstall of windows. You will have the same IP address(es), so your players will be able to find you again when you're back online.

You could try to do a system restore, which would restore your OS to a previous state(you would lose any changes made to the OS/files after that point though).
Not a NFO employee
preben
A regular
A regular
Posts: 33
Joined: Fri Dec 05, 2014 2:14 pm

Re: VDS hacked by an attacker.

Post by preben »

Okay, i will do that.

Is enabling filezilla okay.
Image
User avatar
soja
This is my homepage
This is my homepage
Posts: 2389
Joined: Fri May 18, 2012 3:20 pm

Re: VDS hacked by an attacker.

Post by soja »

preben wrote:Okay, i will do that.

Is enabling filezilla okay.
Yes
Not a NFO employee
mikedbom
This is my homepage
This is my homepage
Posts: 82
Joined: Thu Dec 06, 2012 3:40 pm
Location: Rocklin, CA
Contact:

Re: VDS hacked by an attacker.

Post by mikedbom »

Edge100x wrote:This is a good reminder to everyone not to install WAMP or XAMPP on a production server unless you really know what you're doing (and if you do know what you're doing.. you should be installing the applications directly anyway). We see far too many people who are immediately exploited like this when they do it.

You should back up your files and perform a wipe.
Edge,

Can you provide more details on this? I have WAMP running for my B3 database but I followed all your recommended security tips and only use FileZilla to transfer applications and install locally. Changed FTP and RDP ports as well.
Image
Image
User avatar
kraze
Former staff
Former staff
Posts: 4362
Joined: Fri Sep 17, 2010 9:06 am
Location: California

Re: VDS hacked by an attacker.

Post by kraze »

mikedbom wrote:
Edge100x wrote:This is a good reminder to everyone not to install WAMP or XAMPP on a production server unless you really know what you're doing (and if you do know what you're doing.. you should be installing the applications directly anyway). We see far too many people who are immediately exploited like this when they do it.

You should back up your files and perform a wipe.
Edge,

Can you provide more details on this? I have WAMP running for my B3 database but I followed all your recommended security tips and only use FileZilla to transfer applications and install locally. Changed FTP and RDP ports as well.
It's really not just WAMP or XAMPP that are insecure, most pre-configured options are going to be insecure since they are not designed for a production environment. They were designed as a quick and easy way to do development and testing.

That doesn't mean they can't be secured, it just takes a bit more work to do so. Generally people that use those applications don't know what steps to take and in-turn leave them unsecured indefinitely.
@Kraze^NFo> Juski has a very valid point
@Juski> Got my new signature, thanks!
@Kraze^NFo> Out of context!
@Juski> Doesn't matter!
@Juski> You said I had a valid point! You can't take it back now! It's out there!
Post Reply