Position: Home page » Equipment » NAS mining worm

NAS mining worm

Publish: 2021-04-19 01:25:47
1.

a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,

will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of

client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server

{rrrrrrr}

mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.

careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine

a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease

virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,

do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack

in the later stage

through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,

sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server

runs stably, and the network station opens normally

2. It's OK to use Tencent computer housekeeper. Every time I download a software, I open Tencent computer housekeeper, and then check if there is any abnormality in the software. If not, I use it. If there is, Tencent computer Housekeeper will kill it directly
3. It's very simple. It's called a worm. Is the stone you dig very hard? If so, he is. And once he's born, he will summon all around him, so he'll kill you
4. On the evening of February 6, 360 Network Security Research Institute announced that the world's First Android mining worm broke out, which affected a number of smart TVs, TV boxes, set-top boxes, etc. with the "ADB debugging" switch on. This group of malware is not a traditional Android virus, but a new type of malware specialized in "mining" in the background of Android devices. Within 24 hours, 5000 devices have been infected with Android mining worm, and at present, more than 7000 devices have been infected. China and South Korea are the hardest hit areas of this worm disease.
5. Hello friends, some viruses can't be killed in normal mode. You can try the following operations: (1) after restart, F8 enters the network security mode. (2) use 360 security guard to clear plug-ins, garbage, traces, system repair, one key optimization of advanced tool "boot item management", and use "Trojan killing" to kill Trojans, Use 360 to kill all viruses. If it has not been cleared, the following solutions can be used: (3) restart, F8 into the network security mode (4) try the 360 system first aid box, hoping to help you
6. This virus mainly attacks enterprise intranet and windows system (to install ms07-010 patch), without any operation of the user. As long as the computer is turned on and connected to the Internet, criminals can plant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers. Customer service 219 answers for you. Users in Guizhou area are concerned about the official account of China Telecom customer service in Guizhou. WeChat can pay the fee and check the charges and charges with one key. The flow, points, bills and detailed lists can be self-help, convenient and quick.
7. The devil's altar, there's a lot in the rotten land. Similar to the workbench, you can synthesize boss summoning supplies such as worm t
in front of meat mountain, you can't use a hammer to destroy it (to destroy it will cause damage to yourself). To defeat meat mountain, you must drop a hammer: Divine hammer. With it, you can destroy the altar without losing blood
after destroying the altar, you will jump out of the command prompt: your world has given Mithril / Mountain Copper / titanium... Every time you smash an altar, new three minerals will be randomly brushed out in the world, and some areas (small areas) will be corroded / bloody at the same time
the rotten place corresponds to the demon altar, and the bloody place corresponds to the bloody altar. In fact, there are two kinds of altars under the ground, one of which has more functions
8. Try ClamAV under Linux. It seems to be the only antivirus software that is still developing and free under Linux. The rest of the anti-virus software under Linux seems to cost a lot of money...

your company had better buy a set of genuine enterprise anti-virus software and install it into Server 2003, and then you can prepare another anti-virus software. If you can't kill the virus, you can dismantle the hard disk and kill it again. In addition, it is necessary to prepare a clean and non-toxic machine to make a live CD antivirus disk. I used 360 antivirus. It's too useless

but shouldn't the server be killed when employees use storage devices privately? Your management is too lax
linux should not worry about virus attack, just need to antivirus or manually delete the virus file to solve the problem of virus
in fact, the best way is to back up the data from the data server and install the system again. Linux NAS is also the best way to back up the data redo system. After the two systems are well set up again on line
the two machines should be strictly forbidden for employees to use, and only the required network ports should be opened with firewalls

don't forget that the backup data needs to be antivirus once more
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750