I will advise you to send to info@myvestacp.com these files:Put these files in one .tar or .zip archive.
There is nothing suspicious on our 200 servers in our hosting company.
We just did a deep check on our 200 servers (last modification of files, grep for '@eval', also carefully checked our c.myvestacp.com and apt.myvestacp.com, modifications, md5 sums, last 30 root logins, etc... also checked again all github commits for last 4 months).
By the way, did you set "secret_url" for myVesta?
Code:
/var/log/vesta/nginx-access.log* (wildcard means: .1.log, .2.log.gz, etc... if exists)/var/log/vesta/nginx-error.log*/var/log/vesta/system.log*/var/log/vesta/error.log*/var/log/auth.log*/var/log/syslog*/root/.bash_history
There is nothing suspicious on our 200 servers in our hosting company.
We just did a deep check on our 200 servers (last modification of files, grep for '@eval', also carefully checked our c.myvestacp.com and apt.myvestacp.com, modifications, md5 sums, last 30 root logins, etc... also checked again all github commits for last 4 months).
By the way, did you set "secret_url" for myVesta?
Statistics: Posted by myVesta — Sun Aug 18, 2024 1:35 pm