I was doing some consulting work for a small VPS provider (who isn't on this forum, as far as I know), they wanted a custom kernel module written to log performance metrics. This was to be installed on the host node, so it could audit things like to see how 'busy' a vm was from the host node (and perhaps track abuse ;-)
When I initially logged into the server, the users had a webserver, mail, rsync's running to an NFS partition on a different block of IPs in another datacenter.
While I was attempting to write this module, I needed some things to test it out on, anyways, the client of mine decided to tell me that his webserver was acting fishy with his VM frontend (whatever run-of-the-mill control panel) by redirecting to certain websites with no apparent source.
Alas, after doing to debugging with GDB/IDA, his server was compromised by a malicious httpd binary designed to remain hidden; Not only that, his sshd was compromised as well (it wasn't logging connections anymore). This is probably a new version of Cdorked floating around (didn't investigate much)
Now, I informed the client of this, and his response was: "Oh [we] removed the ssh hacks off months ago, but it keeps coming back" (not exactly, but that sums it up)
I had most of the module written, but at this point, I refunded him his initial payment and told him 'no thanks' because of the attitude.
This is a reminder to all of you that sell VPS's, if you're not careful or paranoid about security, you'll end up compromised, and your clients can have their data stolen as well which will come back to bite you 100,000 times harder.
When I initially logged into the server, the users had a webserver, mail, rsync's running to an NFS partition on a different block of IPs in another datacenter.
While I was attempting to write this module, I needed some things to test it out on, anyways, the client of mine decided to tell me that his webserver was acting fishy with his VM frontend (whatever run-of-the-mill control panel) by redirecting to certain websites with no apparent source.
Alas, after doing to debugging with GDB/IDA, his server was compromised by a malicious httpd binary designed to remain hidden; Not only that, his sshd was compromised as well (it wasn't logging connections anymore). This is probably a new version of Cdorked floating around (didn't investigate much)
Now, I informed the client of this, and his response was: "Oh [we] removed the ssh hacks off months ago, but it keeps coming back" (not exactly, but that sums it up)
I had most of the module written, but at this point, I refunded him his initial payment and told him 'no thanks' because of the attitude.
This is a reminder to all of you that sell VPS's, if you're not careful or paranoid about security, you'll end up compromised, and your clients can have their data stolen as well which will come back to bite you 100,000 times harder.