Hello guys,
Yesterday something very weird happened. I received an email like this:
Subject: *** SECURITY information for mydomain.com ***
Body: mydomain.com : Feb 27 18:27:09 : phl : user NOT in sudoers ; TTY=pts/1 ; PWD=/home/phl ; USER=root ; COMMAND=/bin/su
"mydomain.com" is purely representation of my domain, of course.
After that I found out that my PuTTy window that was open was shutdown and when I tried to login back... my password didn't work. In desperation I shutdown my server and went home. Today I restarted it and changed my root password via Linode Control Panel... but now I am afraid it will happen again. Anyone know what can cause this? What can I do to prevent this kind of attack (if that's correct)?
Just now I received another email:
Subject: Cron <root@ouro> [ -x /usr/lib/php5/maxlifetime ] && [ -d /var/lib/php5 ] && find /var/lib/php5/ -depth -mindepth 1 -maxdepth 1 -type f -cmin +$(/usr/lib/php5/maxlifetime) -delete (failed)
Body: find: invalid predicate `-delete'
I logged in ssh again and typed crontab -l and nothing is listed for root... how can I see this cronjob? I never used cronjob... so I'm 99% sure I was hacked and that he started a (badly typed) cronjob... could somebody help me before I have a heart attack?
Thanks in advance!