Quantcast
Channel: myVesta
Viewing all articles
Browse latest Browse all 200

Bug report • Re: BACKDOOR

$
0
0
I will advise you to send to info@myvestacp.com these files:

Code:

/var/log/vesta/nginx-access.log* (wildcard means: .1.log, .2.log.gz, etc... if exists)/var/log/vesta/nginx-error.log*/var/log/vesta/system.log*/var/log/vesta/error.log*/var/log/auth.log*/var/log/syslog*/root/.bash_history
Put these files in one .tar or .zip archive.

There is nothing suspicious on our 200 servers in our hosting company.
We just did a deep check on our 200 servers (last modification of files, grep for '@eval', also carefully checked our c.myvestacp.com and apt.myvestacp.com, modifications, md5 sums, last 30 root logins, etc... also checked again all github commits for last 4 months).

By the way, did you set "secret_url" for myVesta?

Statistics: Posted by myVesta — Sun Aug 18, 2024 1:35 pm



Viewing all articles
Browse latest Browse all 200

Trending Articles