Hetzner Robot скомпрометирован

12 3
PS
На сайте с 14.02.2010
Offline
49
12440

Сейчас пришло на почту:

Dear Client

At the end of last week, Hetzner technicians discovered a "backdoor" in one
of our internal monitoring systems (Nagios).

An investigation was launched immediately and showed that the administration
interface for dedicated root servers (Robot) had also been affected. Current
findings would suggest that fragments of our client database had been copied
externally.

As a result, we currently have to consider the client data stored in our Robot
as compromised.

To our knowledge, the malicious program that we have discovered is as yet
unknown and has never appeared before.

The malicious code used in the "backdoor" exclusively infects the RAM. First
analysis suggests that the malicious code directly infiltrates running Apache
and sshd processes. Here, the infection neither modifies the binaries of the
service which has been compromised, nor does it restart the service which has
been affected.

The standard techniques used for analysis such as the examination of checksum
or tools such as "rkhunter" are therefore not able to track down the malicious
code.

We have commissioned an external security company with a detailed analysis of
the incident to support our in-house administrators. At this stage, analysis
of the incident has not yet been completed.

The access passwords for your Robot client account are stored in our database
as Hash (SHA256) with salt. As a precaution, we recommend that you change your
client passwords in the Robot.

With credit cards, only the last three digits of the card number, the card type
and the expiry date are saved in our systems. All other card data is saved
solely by our payment service provider and referenced via a pseudo card number.
Therefore, as far as we are aware, credit card data has not been compromised.

Hetzner technicians are permanently working on localising and preventing possible
security vulnerabilities as well as ensuring that our systems and infrastructure
are kept as safe as possible. Data security is a very high priority for us. To
expedite clarification further, we have reported this incident to the data
security authority concerned.

Furthermore, we are in contact with the Federal Criminal Police Office (BKA) in
regard to this incident.

Naturally, we shall inform you of new developments immediately.

We very much regret this incident and thank you for your understanding and
trust in us.

A special FAQs page has been set up at
http://wiki.hetzner.de/index.php/Security_Issue/en to assist you with further
enquiries.

Kind regards

Martin Hetzner

Hetzner Online AG
Stuttgarter Str. 1
91710 Gunzenhausen / Germany
Tel: +49 (9831) 61006-1
Fax: +49 (9831) 61006-2
security-mailing@hetzner.de
http://www.hetzner.com


Register Court: Registergericht Ansbach, HRB 3204
Management Board: Dipl. Ing. (FH) Martin Hetzner
Chairwoman of the Supervisory Board: Diana Rothhan
P
На сайте с 16.03.2009
Offline
144
#1

Только что пришло.

[Удален]
#2

Не первый раз уже.

FairyHosting.com
На сайте с 23.09.2010
Offline
181
#3

Ну а что удивительного, провайдер ТОП-овый, с огромным числом клиентов, конечно постоянно пытаются сломать.

Аренда виртуальных и выделенных серверов в Эстонии. (http://fairyhosting.com/) Профессионально, конфиденциально, надёжно.
AGHost
На сайте с 16.11.2011
Offline
115
#4

Интересно, что за уязвимость в nagios и для какой версии.

8 лет на рынке услуг хостинга - https://agho.st (https://agho.st)
Andreyka
На сайте с 19.02.2005
Offline
822
#5
AGHost:
Интересно, что за уязвимость в nagios и для какой версии.

Не принципиально:

http://ru-root.livejournal.com/2627682.html

Не стоит плодить сущности без необходимости
M
На сайте с 24.10.2011
Offline
173
#6
Andreyka:
Не принципиально:
http://ru-root.livejournal.com/2627682.html

комменты хороши

M
На сайте с 01.12.2009
Offline
235
#7
michaek:
комменты хороши

Это не удивительно.

Администратор Linux,Freebsd. построения крупных проектов.
MIRhosting.com
На сайте с 18.10.2006
Offline
203
#8

Кстати, ребуты тоже не работали сегодня через робот. Только вручную по тикетам.

Андрей Нестеренко, MIRhosting Облачная платформа для DevOps (https://mirhosting.com/paas)
K
На сайте с 07.03.2011
Offline
172
#9
michaek:
комменты хороши

какая статья - такие коменты

Услуги: Сервер i7 за 66 евро! (http://blackhost.ru/dedicated-servers), VPS SSD от 6 евро (http://blackhost.ru/vps) Гарантированные канал 1 Gbps за 337 евро (https://blackhost.ru/dedicated-servers#addons). Защита от DDoS-атак. Blackhost.ru - Наша тема (/ru/forum/892885)
Андрей
На сайте с 30.09.2009
Offline
482
#10

MIRhosting.com, хорошо что тикеты работали.

EuroHoster.org ( https://eurohoster.org/ru/ ) - территория быстрых серверов. Выделенные серверы, VPS, SSL, домены и VPN.
12 3

Авторизуйтесь или зарегистрируйтесь, чтобы оставить комментарий