-
-
Notifications
You must be signed in to change notification settings - Fork 610
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[INFO] Hack my cyberpanel #1346
Comments
i think its fixed in newest update |
i also have the same problem. recently, my vps server was hit by malware. they decrypted all my files. luckily the vps provider still provides backup |
Yes but a lot of users have now encrypted servers and not everyone has a backup. It is called: responsible disclosure
As of today, I never got an email about the exploit! |
I agree with you, the CyberPanel team never informed the user about the exploit until the POC was disclosed. |
It seems that the fix has been applied, but upon reviewing the code, I see a copy-paste. link. I find it hard to believe that no one from the team communicated this or that there was no update alert on the panel. I am disappointed by this behavior. Fortunately, we had a backup, but other agencies will surely struggle with this issue. The update and security alert system needs to be reviewed. I only see this on their site: link. |
Same problem, extension of encrypted files - .L0CK3D |
First, my server got this backdoor Then, on the server i'm found this file (!!!Warning!!!) It's not all!!! I'm found more malware: usr/bin/perfcc |
Were you able to find a solution? |
It's C3RB3R Conti v3-based Ransomware No decryptors ((( |
Same as me, but i have backup i just restore and update cyberpanel to latest version |
Check your firewall config. I found in Alma Linux, in config file: drifting zone enbled This string is enable allows traffic to drift between security zones... This happened after an attack on the server. |
If you cant able to access SSH , once you are in , run this batch script to remove virus
|
An alternative option could be the rescue console, if this is supported by your provider/hoster. Something like this: https://docs.hetzner.com/robot/dedicated-server/troubleshooting/hetzner-rescue-system |
Good morning everyone,
This morning, my server with CyberPanel installed was hacked. I couldn't retrieve the logs due to the immediate shutdown of the machine, but while browsing the internet, I found this: link. I don't know if you were aware of it. It seems they inserted SSH and then launched a script. The site was accessible from the outside as it was a test system. If you have already resolved the issue, thank you very much and feel free to close the issue.
The text was updated successfully, but these errors were encountered: