1. 程式人生 > >關於騰訊雲主機遭遇勒索病毒RANSOMWARE([email prote

關於騰訊雲主機遭遇勒索病毒RANSOMWARE([email prote

   今天上班的時候,騰訊雲突然發來一份郵件說我的那臺學生機在異地登陸了,我趕緊去連線xshell看了下。

結果就是下面的資訊

Hi, please view here: https://pastebin.com/raw/eFDC9giY for information on how to obtain your files!

網址內容如下:

YOU HAVE BEEN INFECTED WITH RANSOMWARE | YOU HAVE BEEN INFECTED WITH RANSOMWARE
You have been hacked.
When you were hacked, your files were sent to a server that we control and removed from you.
You must pay 0.25 BITCOIN to get your files back and prevent them from being leaked to this address:
14z9Rbpw5SozMuMRRrdwcKaSs4PsxiEHRE
We are the only ones in the world that can provide your files for you!
When you have sent payment, send e-mail to 
[email protected]
with: 2) SERVER IP ADDRESS 3) BTC TRANSACTION ID FBI SUGGEST TO JUST PAY: https://www.tripwire.com/state-of-security/latest-security-news/ransomware-victims-should-just-pay-the-ransom-says-the-fbi/ When you pay, you will receive an FTP account where you can retrieve your files and delete all your data from us. If you do not pay, at end of the month we will collect all data that remains on server and leak it. HOW TO PURCHASE BITCOIN: You can purchase bitcoin from following: http://localbitcoins.com http://kraken.com http://okcoin.com http://coinbase.com You can message
[email protected]
for support, but we will not respond to questions such as "can i see files first?" because we do not have time for this When you have sent payment, put [PAID] in email subject so we can attend to you before others!

大致意思就是說被黑客入侵了,必須要付比特幣。

當時我就想,我這臺機器就裝了一個寶塔,還有附帶的mysql,phpmyadmin,然後一個redis是我自己做測試用,百度了一下發現有兩位博主也遭遇到了這種現象,國外有篇文章也是關於這個的,下面有評論說,攻擊者只是操作redis獲取了許可權,不用支付,他們並沒有儲存檔案。

  我看了一下那篇文章,總而言之就是redis服務暴露在外網的原因,攻擊者操作redis然後執行了以下命令:

rm -rf /var/www/
rm -rf /usr/share/nginx
rm -rf /var/lib/mysql/
rm -rf /data/
echo "Hi, please view: http://termbin.com/um7t for further information in regards to your files" > /root/READ_TO_DECRYPT
echo "Hi, please view: http://termbin.com/um7t for further information in regards to your file!" > /etc/motd

解決方案如下:

防止攻擊者破壞Redis例項的最簡單方法是避免將其暴露給Internet。但是,如果必須外部暴露Redis,可以採取一些措施將其鎖定:

設定AUTH密碼 - 使用者可以配置與Redis例項的所有連線所需的密碼。設定此項時,請確保密碼很複雜,因為攻擊者可以輕鬆強制使用較短的密碼。

重新命名或禁用CONFIG命令 - 可以將CONFIG命令重新命名為不可取用的命令或完全禁用它。如果不需要該命令,我們強烈建議禁用它。

最後,與任何暴露在網際網路上的軟體一樣,保持Redis最新是至關重要的。Redis 3.2.0版添加了一項名為保護模式的功能。此模式可防止使用不安全配置意外部署Redis例項(繫結到沒有密碼的所有介面),這有助於防止發生危害