Active attacks using stolen SSH keys (UPDATED)

Published: 2008-08-26
Last Updated: 2008-08-28 21:15:41 UTC
by John Bambenek (Version: 1)
0 comment(s)

The US-CERT is reporting that there is active attacks against Linux environments using stolen SSH keys.  There is a new rootkit out, Phalanx2 which is dropped by attackers which, among the usual rootkit tasks, steal any SSH key on a system.  The attackers then, presumably, use those stolen keys (the ones without passwords/passphrases at least) to get into other machines.

Sources of compromised keys could include the weak key vulnerability in Debian-based systems a few months ago, so if you haven't updated and replaced those keys, you ought to do so now.

The biggest defense is to have any keys, especially those used to authenticate to remote machines and certainly internet facing ones, require a passphrase to use.  Check your logs, especially if you use SSH key-based auth, to identify accesses from remote machines that have no business accessing you.  If you have IPs, that would be good.

To detect if you have Phalanx2, look for /etc/khubd.p2/ (access by cd, not ls) or any directory that is called "khubd.p2".  /dev/shm/ may contain files from the attack as well.  Tripwire, AIDE and friends should also be able to detect filesystem changes.

UPDATE:  A couple of quick updates.  Fellow Handler Bill Stearns mentioned several tools like this that can sniff out vulnerable keys.  Also, here is some more technical details on the phalanx2 rootkit.

--
John Bambenek
bambenek /at/ gmail \dot\ com

 

Keywords: exploit phalanx2 ssh
0 comment(s)

Podcast Episode X Record Notice

Published: 2008-08-26
Last Updated: 2008-08-26 16:21:33 UTC
by Joel Esler (Version: 3)
0 comment(s)

Tuesday night at 7:30 EDT (Eastern Daylight Savings Time) Johannes, John, and I will be recording Episode X of the Internet Storm Center Podcast.

We'll be broadcasting live at http://www.stickam.com/joelesler

Please come and join!  We love live feedback, talk with us in the stickam interface or via IRC in #dshield on irc.freenode.net.

Thanks!

Sorry for the confusion.  It's Tuesday night.  TONIGHT.  Not Wednesday.

-- Joel Esler http://www.joelesler.net

Keywords: podcast
0 comment(s)

Comments

cwqwqwq
eweew<a href="https://www.seocheckin.com/edu-sites-list/">mashood</a>
WQwqwqwq[url=https://www.seocheckin.com/edu-sites-list/]mashood[/url]
dwqqqwqwq mashood
[https://isc.sans.edu/diary.html](https://isc.sans.edu/diary.html)
[https://isc.sans.edu/diary.html | https://isc.sans.edu/diary.html]
What's this all about ..?
password reveal .
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure:

<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.

<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
https://thehomestore.com.pk/

Diary Archives