当前位置:网站首页>Record Alibaba cloud server mining program processing
Record Alibaba cloud server mining program processing
2022-04-23 12:55:00 【WENHUI012】
Preface
Suddenly, I received a text message from alicloud , Said the server appeared a malicious mining program , Fortunately, there are test servers on this one , I also did data backup before , You can take care of it , But you still have to be careful. Remember to backup it before serious operation

Treatment process
1、 Check the server load against CPU utilization , Determine the progress of the mining process
- Carry out orders :
top, Pictured : Found a network01 Things occupied by cup Reached 87%, But I'm in the server root tmp I didn't see this thing

- It is confirmed from the above that PID Process number , Check the directory where you're going . Carry out orders , There's no clear location , You can see the executable link
ll /proc/ process ID

- And then directly adopt find / -name network01 Found the following location , When I came to the location directory, I found network01

-
Force to kill the mining process , Delete the mining program executable network01, If you're afraid to delete it wrong, you can back it up ( Leave a regret medicine );
kill -9 1459261
After killing the process ,
top Command view CPU It's down and back to normal
2、 Check the presence of the miner's address in your server's firewall and remove the malicious address
iptables -L -n

3、 Check whether the port security status is abnormal
netstat -aulntp

Starting to wonder about this IP Of 133.11.244.74 What is it , After inquiry, it is your own public network ip
Check your own public network IP Domestic website :http://ip138.com
4、 Check whether the server's timed tasks have been added by attackers , Processing suspicious timing task files , Prevent a second invasion
crontab -l

And
cat /etc/crontab

5、 Check whether there are suspicious programs in the server startup key to ensure that there is no problem after the server restarts
cd /etc/init.d

cat /etc/rc.d/rc.local

6、 Checked linux Whether the system user is added with other root Level administrator users
cat /etc/passwd # user name : password : User ID : Group identification number : Annotative description : Home directory : Sign in Shell

7、 Check the server root Whether to turn on remote permissions , Servers in the production environment PermitRootLogin Should be set no
cat /etc/ssh/sshd_config

8、 Check SSH Whether there is a mining virus in the public key , To prevent continuous backdoors
cat /root/.ssh/authorized_keys

9、 The port security policy configured by alicloud server security group , Yes 80 port , as well as 443 Ports open , The rest SSH Port to proceed IP release , When you need to log in to the server, you can add the released ones in the alicloud background IP, Try to prevent the server from being maliciously logged in

10、 Regularly check the server for mining behavior , Check if there is webshell back door , Regular upgrade and bug fix for system version , System background login for secondary password verification , Prevent the existence of the system sql Inject holes . Prevent mining virus from infecting other servers in Intranet repeatedly
You can also refer to Alibaba cloud's mining procedure practice document : https://www.alibabacloud.com/help/zh/doc-detail/161236.htm
Conclusion
This mining procedure has deleted the mining procedure execution document , Forced killing of the mining process , Timing task 、 The startup and other items didn't find anything suspicious , It could be the hacker. OK ...... The general return said that the service security guard must do well to prevent the server malicious attack , Finally, I hope it will be helpful for you to refer to this article !
版权声明
本文为[WENHUI012]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230616046528.html
边栏推荐
- Record a website for querying compatibility, string Replaceall() compatibility error
- 进程虚拟地址空间区域划分
- 4. DRF permission & access frequency & filtering & sorting
- 21 days learning mongodb notes
- 风尚云网学习-input属性总结
- Servlet监听器&过滤器介绍
- Ad20 supplementary note 3 - shortcut key + continuous update
- 精度、速度完美平衡,最新图像分割SOTA模型重磅发布!!!
- 解决disagrees about version of symbol device_create
- ZigBee CC2530 minimum system and register configuration (1)
猜你喜欢

Introduction to servlet listener & filter

World Book Day: I'd like to recommend these books

CGC: contractual graph clustering for community detection and tracking

bert-base-chinese下载(智取)

NPDP|产品经理如何做到不会被程序员排斥?

SSM框架系列——注解开发day2-2

Zero trust in network information security

解锁OpenHarmony技术日!年度盛会,即将揭幕!
![[csnote] ER diagram](/img/97/82e8c2183fcafda50950a953ca0955.png)
[csnote] ER diagram

拥抱机器视觉新蓝海,冀为好望开启数字经济发展新“冀”遇
随机推荐
Introduction to kubernetes
leetcode-791. Custom string sorting
Uni app native app local packaging integrated Aurora push (jg-jpush) detailed tutorial
STM32 control stepper motor (ULN2003 + 28byj)
Packet capturing and sorting -- TCP protocol [8]
STM32工程移植:不同型号芯片工程之间的移植:ZE到C8
使用Source Insight查看编辑源代码
RT-thread中关键词解释及部分API
数据库中的日期时间类型
Wonderful review | the sixth issue of "source" - open source economy and industrial investment
Pre competition practice of TIANTI competition
航芯技术分享 | ACM32 MCU安全特性概述
Luogu p5540 [balkanoi2011] timeismoney | minimum product spanning tree problem solution
Zero trust in network information security
Record a website for querying compatibility, string Replaceall() compatibility error
Kubernetes 入门教程
Unable to create servlet under SRC subfile of idea
Teach you to quickly develop a werewolf killing wechat applet (with source code)
标签与路径
4. DRF permission & access frequency & filtering & sorting