Broiler mining
a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,
will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of
client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server
{rrrrrrr}
mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.
careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine
a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease
virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,
do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack
in the later stage
through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,
sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server
runs stably, and the network station opens normally strong>
세 51032; 49345;
depending on the price, if the price difference is about 200 yuan, you can consider Xunjing or Yingtong.
broilers are generally sold by hackers at prices ranging from 0.08 yuan, 0.1 yuan to 30 yuan
to log in broiler, you must know three parameters: IP, user name and password of remote computer
when it comes to broilers, we should talk about remote control. Remote control software such as grey pigeon, Shangxing, etc
broiler is not a kind of food. It's a machine that can be remotely controlled by Trojan horse or by leaving a back door. Now many people call a machine with webshell permission a broiler
no one wants their computer to be controlled by others, but many people's computers are almost undefended, and they are easy to be completely controlled by remote attackers. Therefore, your computer becomes the meat on other people's chopping board, and people can eat it as they want, which leads to the name of broiler (machine)<
[edit this paragraph] how to detect whether you become a broiler
pay attention to the following basic situations:
1: QQ, MSN abnormal login reminder (the system prompts that the last login IP does not match)
2: when logging in Online games, it is found that the equipment is missing or does not match the last offline location, or even can not log in with the correct password
3: sometimes you suddenly find that your mouse doesn't work. When you don't move the mouse, the mouse will move, and you will click the relevant button to operate
4: when you surf the Internet normally, you suddenly feel very slow, and the hard disk light is flashing, just like you usually files
5: when you are ready to use the camera, the system prompts that the device is in use
6: when you are not using network resources, you find that the network card light is flashing. If you set it to display after connecting, you will also find the network card icon in the lower right corner of the screen flashing
7: out of line service
8: users with broadband connection receive abnormal packets when they are not connected after the hardware is turned on There may be a program background connection)
9: the firewall loses control of some ports
10: restart the computer ring the process of surfing the Internet
11: some programs, such as antivirus software firewall, will flash when they are unloaded (the unloading interface will flash by, and then the report is completed.)
12: after the program (QQ ` antivirus) that some users trust and often use is unloaded. The catalog file still exists and is automatically generated after deletion
13: the above phenomenon is basically subjective and not very accurate, but it needs your attention
14: you can also check whether there are suspicious ports by inputting netstat - an under CMD
next, we can use some software to observe the network activity to check whether the system is invaded
1. Pay attention to check the working status of firewall software
for example, Jinshan net dart. In the network status page, the currently active network connections will be displayed. Check the related connections carefully. If you find that you're not using software to connect to a remote computer, be careful
2. It is recommended to use tcpview to clearly view the current network activity
General Trojan connections can be viewed through this tool
here, the general Trojan connection is different from some carefully constructed rootkit Trojans, which adopts more advanced hiding technology and is not easy to be found
3. Use Jinshan cleaning experts to conct online diagnosis, especially pay attention to the process items of comprehensive diagnosis
cleaning experts will evaluate the safety of each item, and need to be very careful when encountering unknown items< How to prevent your computer from becoming a "broiler"
1. Close the high-risk port:
first, click "start" menu / settings / control panel / management tool, double-click to open "local security policy", Select "IP security policy on local computer", right-click in the blank position of the right pane, and the shortcut menu will pop up. Select "create IP security policy", and a wizard will pop up. Click the next button in the wizard to name the new security policy; Then press "next" to display the "secure communication request" screen, remove the hook on the left side of "activate default corresponding rules" on the screen, and click "finish" to create a new IP security policy
in the second step, right-click the IP security policy, remove the hook on the left side of "use add Wizard" in the "properties" dialog box, and then click the "add" button to add a new rule, then the "new rule properties" dialog box will pop up, and click the "add" button on the screen to pop up the IP filter list window; In the list, first remove the hook on the left of "use add Wizard", and then click the "add" button on the right to add a new filter
the third step is to enter the "filter properties" dialog box. The first thing you see is addressing. Select "any IP address" for the source address and "my IP address" for the destination address; Click the "Protocol" tab, select "TCP" in the "select protocol type" drop-down list, then enter "135" in the text box under "this port", and click "OK" (as shown in the left figure). In this way, a filter is added to shield the TCP 135 (RPC) port, which can prevent the outside world from connecting to your computer through port 135
click "OK" and return to the dialog box of filter list. You can see that a policy has been added. Repeat the above steps and continue to add TCP ports 137, 139, 445, 593 and UDP ports 135, 139, 445 to create corresponding filters for them
repeat the above steps to add the shielding strategy of TCP ports 1025, 2745, 3127, 6129 and 3389, establish the filter of the above ports, and finally click "OK"
Step 4: in the "new rule properties" dialog box, select "new IP filter list", then click the circle on the left to add a dot to indicate that it has been activated, and finally click the "filter action" tab. In the "filter action" tab, remove the hook on the left side of "use add Wizard", click "add" button to add "block" action (right figure): in the "security measures" tab of "new filter action properties", select "block", and then click "OK" button
Step 5: enter the "new rule properties" dialog box, and click "new filter action"
a dot will be added to the circle on the left side to indicate that it has been activated. Click "close" to close the dialog box; Finally, return to the new IP security policy properties dialog box, check the left side of the new IP filter list, and press OK to close the dialog box. In the local security policy window, right-click the newly added IP security policy and select assign
after restarting, the above network ports in the computer will be closed, and viruses and hackers can no longer connect to these ports, thus protecting your computer
2. Update the anti-virus software in time.
generally, broiler hunters use "grey pigeon" virus to control your computer. It is recommended to use grey pigeon killing software to kill the virus
3. Frequently check the system
frequently check the antivirus software, firewall directory, service, registry and other related items on your computer
hackers often use users' trust to hide or implant Trojans into these programs
be alert to DLLs with system properties that appear in these directories It may be used for DLL hijacking)
be alert to the pagefile.sys which appears at the root of the disk. It can also be used to hide files. To check whether the drive letter of the system's page file corresponds to them)
4. There is a huge risk of pirating Windows XP
if your operating system is installed by other technicians, or it may be pirated XP, such as * * version of the computer installation company, tomato Garden XP, rain forest XP, tornado XP, etc. Many of these systems are installed unattended. The installation procere is very simple. You put the CD into the computer, go out for tea, and then you may find that the system has been installed
What are the biggest defects of such a system? However, the administrator password of this system is empty, and automatically log in. That is to say, anyone can try to log into your system with an empty password. Distance is not an obstacle to the Internet at all
5. Use mobile storage devices carefully
before the development of Internet, the spread of virus depended on floppy disk, and then gave way to the network. Nowadays, the public more and more frequently use mobile storage devices (mobile hard disk, U disk, digital memory card) to transfer files. These mobile storage devices become an important channel for Trojan horse transmission. Computer users usually call this kind of virus [1] [2] [3] U disk virus or auto virus. It means that the action of inserting a USB flash disk can make the virus spread from one USB flash disk to another computer
6. Safe access to the Internet
one of the most important reasons for broilers is to browse unsafe websites. It is very difficult for ordinary users to distinguish which websites are safe and which ones are not. And there is also the possibility that the original normal website is invaded and implanted with Trojan horse, and there is also the risk of downloading Trojan horse when visiting any webpage after being attacked by ARP
there are always opportunities to download Trojans on the Internet, which can only rece the risk
the security of browser needs special attention. The vulnerability of browser and browser plug-in is the favorite of hackers. The vulnerability of flash player is plug-in vulnerability. This vulnerability is cross browser platform, and it may exist in any situation where flash player is used< If you find that IE often asks whether you are running some ActiveX controls, or generating inexplicable files, or asking about debugging scripts, you must be alert. You may have been caught. There are two typical cases of Internet intrusion:
one is that the browser's default home page or title is modified when browsing some web pages with malicious code, which is light; There is also the problem that you can format your hard disk or make your windows open continuously until you run out of resources and crash. This situation is much worse. The data you have not saved or put on your hard disk may be partially or completely lost
the second is the potential Trojan horse attack, or worm like virus attack, so that your machine can constantly send your privacy to the outside world, or use your name and email address to send garbage, further spread the virus; And then there is
performance of infected USB flash disk:
the virus will create two hidden directories and a shortcut file under the root directory of the infected USB flash disk, and the names of the two hidden directories are "-" and "windows services" respectively. All the files in the original U disk are stored in the directory named "-" and three virus files are stored in the directory named "windows services". The file names are movemenore g.vbs, installer.vbs and helper.vbs
infection path:
after the U disk is infected, insert it into the new computer. Just click the shortcut in the U disk to imitate your normal files, and the infection will be triggered to the new computer. Generally, the virus will be copied to the computer% appdata% & # 92; Windows services directory, and then add boot, if there is a new U disk inserted on the trouble to infect the new U disk< First, display and hide system files, open any folder, click Tools - Folder Options - and then select view, uncheck
Hide protected operating system files, hide files and folder, select Show hidden files
2. Find the location of the three files, open them in the USB flash drive, and delete them directly. The files in the computer system are in C: 92; Users\ Administrator\ AppData\ Roaming\ Windows services folder, but not every computer is this folder C:\ Users\**** Use your own name here; AppData\ Roaming\ WindowsServices\ The folder is displayed in Chinese, so if you can't find a small partner, just the path and change it to your user name. 3. Pay attention to the U disk to pull out the computer first, and then delete these virus files in the computer. There are three files in Windows services, movemenore g.vbs, installer.vbs, helper.vbs, to delete< Second, software cleaning
USB killer tool in U-disk antivirus software can directly scan all VBS viruses in the computer and U-disk to remove all VBS viruses, which is more convenient than manual operation. Manual operation is suitable for use when there is no network
you can see the result of VBS virus list and virus clear when you click start scanning and wait for the scanning to complete.
Is a download will be automatically implanted in the computer malicious mining Trojan horse and modify the user DNS configuration, forced to insert advertising Trojan horse tool. Downloading is not recommended
start the script to execute the request URL regularly. The Trojan writer only needs to set the URL to be downloadable, and the user will be attracted
can't turn on the machine or can't get in when it's turned on, is it related to the improper operation before you turn it off? For example: playing games, watching videos, operating big things, using the computer for a long time caused by the card, right? Or download the inappropriate things, or delete the system files, or power off, the fault will not happen for no reason, right
press the power button to turn on and off the machine repeatedly, and try to put it on for a period of time. If you really can't, you can't just re install the system. If you can't, you can spend 30 yuan to go to the maintenance office and find a maintenance person to help you
as long as your computer doesn't get stuck, has a blue screen, and is shut down suddenly, it won't turn on like this
please ask me if you have any questions.