Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Sat Nov 07, 2015 12:20 am 
Offline
Senior Newbie

Joined: Tue Feb 19, 2013 11:20 pm
Posts: 15
Website: http://www.bestshop24h.com
Location: Japan
Skype: bestshop24h
Twitter: bestshop24h
hello

my vps's environment is debian6+apache+mysql+php.
there are some websites built by wordpress, zen-cart,magento,prestashop,dedecms

now I found a problem that the user "www-data" occupies almost all CPU and Memory to uploads a lot of virus files into dedecms's website and send out large amounts of malicious traffic.

could you tell me how to solve the problem?

now ,I am trying to delete all the virus files and limit writing permission of the user "www-data"

could you show me how to limit the user "www-data" without affecting website's running ,because it seems the wordpress is using the user "www-data" to do some functions.

thanks


Top
   
PostPosted: Sat Nov 07, 2015 9:22 pm 
Offline
Senior Member
User avatar

Joined: Sun Jan 18, 2009 2:41 pm
Posts: 830
The Apache web server runs as user www-data. It needs to have access to your web files.

However, it does not necessarily need to have write access. See this Linode guide for more information on managing permissions.

You will find it impossible to completely clean up your existing system. You need to start with a new install. The problem is whatever service that was compromised, probably one of your web services. With your new install, make sure you are using web services that have the latest security patches. Otherwise it will just be compromised again.


Top
   
PostPosted: Sat Nov 07, 2015 10:28 pm 
Offline
Senior Newbie

Joined: Tue Feb 19, 2013 11:20 pm
Posts: 15
Website: http://www.bestshop24h.com
Location: Japan
Skype: bestshop24h
Twitter: bestshop24h
thanks so much!


Top
   
PostPosted: Mon Nov 09, 2015 4:32 am 
Offline
Newbie

Joined: Mon Nov 09, 2015 4:06 am
Posts: 4
If you use a managed hosting provider such as LiquidWeb, one of the numerous php cloud hosting services, specialty php hosting services or a shared host like dreamhost, they will take some responsibility on the server side of things. If you can take the advice from the previous article, identify the malicious scripts and simply report them, they will help you clean things up. There are still tips below that will help you remove the malicious scripts yourself and then your hosting provider can check the servers for further intrusion such as root or shell access.


Top
   
PostPosted: Mon Nov 09, 2015 9:46 am 
Offline
Senior Newbie

Joined: Tue Feb 19, 2013 11:20 pm
Posts: 15
Website: http://www.bestshop24h.com
Location: Japan
Skype: bestshop24h
Twitter: bestshop24h
yes,maybe i need to consider changing a host


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 3 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group