Abuse Message [AbuseID:B7D623:1E]: AbuseInfo: Your server 65.108.15.11 has been registered as an attack source

Your server 65.108.15.11 has been registered as an attack source Incident report Dear provider, I am Mark Bacsko, Incident Analyst at BitNinja Server Security. I’m writing to inform you that we have detected malicious requests targeting our clients’ servers from the IP 65.108.15.11 you own based on a public database. We’ve been able to stop these requests and prevent future attacks by adding your IP to our greylist , but we wanted to reach out and inform you, as you might not be aware. Timestamp (UTC): 2022-11-23 04:08:15 Sometimes it’s not easy to notice that your servers are used as a “bot” sending malicious attacks over the Internet. AGENT LOGS If this is the case with you, you can take steps to protect your and others’ servers. To help you to fix this problem, I’ve collected the 3 earliest logs below, which have led to your IP being blocked. Under the link, you can find the freshest 100 logs that may help you disinfect your server.

Url: [webinars.iek-akmi.edu.gr/wp-admin/profile.php]
 Headers: [array (
   'BN-Client-Port' => '56387',
   'Accept' => '*/*',
   'BN-TP-Proto' => 'https',
   'Host' => 'webinars.iek-akmi.edu.gr',
   'Accept-Encoding' => 'gzip, deflate',
   'Cookie' => 'wordpress_sec_17226b37a79ffa07730d0ca262382ed0=nvogiatzoglou%40iekakmi.edu.gr%7C1663764440%7CxMrvvWf5mTSufVa2EAxxtObRC14KZ1YWLZW58HH1TGQ%7C28255fa1fc1f52807ea9a0184544e987cd5627896e45a0eca32621152d7207c1; PHPSESSID=fda250e7e0f89897c4fb6ddf9a274109; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_17226b37a79ffa07730d0ca262382ed0=nvogiatzoglou%40iekakmi.edu.gr%7C1663764440%7CxMrvvWf5mTSufVa2EAxxtObRC14KZ1YWLZW58HH1TGQ%7C9f044dc5d3d70880c2f0cb8f154d179aba200546f72204a6d5e40228c893606b',
   'BN-Frontend' => 'waf-https',
   'BN-TP-Dstip' => '31.22.115.202',
   'BN-TP-Clientip' => '65.108.15.11',
   'User-Agent' => 'Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Mobile Safari/537.36',
   'BN-X-Forwarded-Proto' => '',
   'X-Forwarded-Proto' => 'https',
   'BN-TP-Dstport' => '443',
   'BN-X-Forwarded-For' => '',
   'X-Forwarded-For' => '65.108.15.11',
   'BN-X-Forwarded-Port' => '',
   'X-Forwarded-Port' => '443',
 )]
 Matched: [
 ModSecurity id: [942421] revision [2]
 msg [Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)]
 match [Matched "Operator `Rx' with parameter `((?:[~!@#$%^&*()-+={}[]|:;"'´’‘`<>][^~!@#$%^&*()-+={}[]|:;"'´’‘`<>]*?){3})' against variable `REQUEST_COOKIES:wordpress_logged_in_17226b37a79ffa07730d0ca262382ed0' (Value: `nvogiatzoglou%40iekakmi.edu.gr%7C1663764440%7CxMrvvWf5mTSufVa2EAxxtObRC14KZ1YWLZW58HH1TGQ%7C9f044dc5 (56 characters omitted)' )]
 logdata [Matched Data: @iekakmi.edu.gr|1663764440| found within REQUEST_COOKIES:wordpress_logged_in_17226b37a79ffa07730d0ca262382ed0: nv###@###mi.gr|1663764440|xMrvvWf5mTSufVa2EAxxtObRC14KZ1YWLZW58HH1TGQ|9f044dc5d3d70880c2f0cb8f154d179aba200546f72204a6d5e40228c893606b]
 severity [WARNING]
 
 Inbound Anomaly Score Exceeded (Total Inbound Score: 6 - SQLI=6,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted SQL Character Anomaly Detection (cookies): # of special characters exceeded (3)
 ]
Manually added by user.
{
     "correlated_logs": {
         "pr_wafaccess": "
                 sibiulazi.ro 65.108.15.11 - - [29/Sep/2022:16:49:53 +0300] "POST /wp-login.php HTTP/1.1" 503 8418 "-" "Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Mobile Safari/537.36" "client-port [60737]""
     },
     "malware_uploaded": "/home/sibiulaz/public_html/wp-content/data.php",
     "malware_name": "{SA-MD5}PHP.Backdoor.10_12_62eb8d888899d"
 }

GO TO INCIDENTS Please keep in mind that after the first intrusion we log all traffic between your server and the BitNinja-protected servers until the IP is removed from the greylist. This means you may see valid logs beside the malicious actions in the link above. If you need help finding the malicious logs, please don’t hesitate to contact our incident experts by replying to this e-mail. Have an amazing week: The BitNinja Team

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *