Results 1 to 5 of 5

Thread: phalanx?

  1. #1
    Join Date
    May 2005
    Beans
    18

    phalanx?

    Hello,
    I have been receiving CRON emails for some time now that first looked like that:


    Date: Thu, 8 Oct 2009 11:00:01 -0400 (EDT)
    From: Cron Daemon <root@################>
    To: root@##############
    Subject: Cron <root@##########> /usr/share/ixscEYMlmLxu.p2/.p-2.4c i &> /dev/null

    (_- phalanx 2.4d -_)
    ; mmap failed..bypassing /dev/mem restrictions
    ; locating sys_call_table..
    ; sys_call_table_phys = 0x6a88e0
    ; phys_base = 0x0
    ; sys_call_table = 0xffffffff806a88e0
    ; hooking.. ################
    ; locating &tcp4_seq_show..
    ; &tcp4_seq_show not found
    >>injected

    I was kind of worried, and I removed the /usr/share/ixscEYMlmLxu.p2/.p-2.4c file (I know this is a somewhat brutal approach...). Since then, I now receive, every minute, emails that look like that:



    Date: Mon, 2 Nov 2009 14:08:01 -0500 (EST)
    From: Cron Daemon <root@############>
    To: root@####################
    Subject: Cron <root@##########> /usr/share/ixscEYMlmLxu.p2/.p-2.4c i &> /dev/null

    /bin/sh: /usr/share/ixscEYMlmLxu.p2/.p-2.4c: not found


    I tried rkhunter and chkrootkit, but found nothing wrong. I also looked into cron and crontab to see what was scheduled every minute, but found nothing... Except these emails, the computer seems to behave normally. Any idea? Should I worry? Thanks.


    --Tristan

  2. #2
    Join Date
    Sep 2009
    Location
    127.0.0.1
    Beans
    159

    Re: phalanx?

    Your machine is infected with an out-of-date version of the phalanx rootkit. Good job sharing your SSH keys around.

    Try upgrading to the current 2.4g version (aka phalanx2) to both:

    1. eliminate the 1-a-minute error e-mails
    2. ensure that the rootkit operates normally

    edit: The intercept-syscall logic in phalanx still works as of 2.6.29-1. A kernel bug is open and a quick perusal of the maintainer's forum indicates that this is working as designed and there's lots of quibbling over the status of the vulnerability. In any event the logic only works if the process has obtained uid=0 priviledge.
    Last edited by __p1n__; November 2nd, 2009 at 09:38 PM.

  3. #3
    Join Date
    Feb 2006
    Beans
    86
    Distro
    Ubuntu 11.10 Oneiric Ocelot

    Re: phalanx?

    Sorry , dude

    CERT: Linux servers under 'Phalanx' attack


    Your system could be infected with a rootkit. Save your personal files and reinstall it all over again.

  4. #4
    Join Date
    May 2005
    Beans
    18

    Re: phalanx?

    Quote Originally Posted by TaTaE View Post
    Sorry , dude

    Your system could be infected with a rootkit. Save your personal files and reinstall it all over again.
    Thanks for your help.

    I have several drives on this machine, with one only being used for / (and, for example, another one for /home). Should I format everything, or just reinstalling the system will be enough? In other words, is the rootkit also potentially hiding in the user folders?

  5. #5
    Join Date
    Sep 2009
    Location
    127.0.0.1
    Beans
    159

    Re: phalanx?

    Quote Originally Posted by TaTaE View Post
    ... Your system could be infected with a rootkit ...
    Not "could be" but rather "is." Mitigating this is the fact that it appears to be both broken (deleted p-2.4.c client) and out of date version.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •