我的服务器是不是被攻击并破防了 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
wangybsyuct
V2EX    问与答

我的服务器是不是被攻击并破防了

  •  
  •   wangybsyuct 2024-09-24 20:13:26 +08:00 1686 次点击
    这是一个创建于 381 天前的主题,其中的信息可能已经有所发展或是发生改变。

    阿里云服务器上发现一些奇怪的文件和文件夹,看文件创建时间,是今天上午 10 点 50 分创建的,文件夹只读和隐藏状态。文件夹叫 C:\0data712\和 C:\Zprogram203\。 操作系统是 windows server 2003 ,非常老,由于有个软件 php 有漏洞,但是系统太老了,无法升级这个软件。所以安装了杀毒软件,可以拦截软件漏洞,但是不确定是否 100%安全。 里面的文件内容都很简单,大家帮我看看是什么情况,是不是破防了。 从 apache 日志看,那个时间的连接没有发现异常请求。

    6 条回复    2024-10-21 15:21:20 +08:00
    foxhunt
        1
    foxhunt  
       2024-09-24 20:32:20 +08:00
    杀下毒先

    八成是有木马了

    如果实在没办法升级程序,可以考虑前边加个 WAF ,按量付费的没多少钱

    安全策略方面,3389 只对自己 IP 开放
    yinmin
        2
    yinmin  
       2024-09-24 21:31:41 +08:00 via iPhone
    杀毒软件不是用来防止软件漏洞的。你需要用 waf
    SWALLOWW
        3
    SWALLOWW  
       2024-09-25 11:21:50 +08:00
    我出现幻觉了,我看成我的鼠标被攻击破防了,我还想鼠标怎么破防
    redidea
        4
    redidea  
       2024-09-25 15:29:21 +08:00
    是不是火绒的防勒索病毒诱惑文件夹,每次开机都会变
    wangybsyuct
        5
    wangybsyuct  
    OP
       2024-09-26 08:49:46 +08:00
    @redidea 好像还真是火绒的动作,我用 ProcessMonitor 监视了一下,强力删除后(普通模式删除不掉),开机后的确会重新产生,参数这些奇怪文件的进程是 system 。
    动作是这样的
    "当天时间","进程名称","PID","操作","路径","结果","详细"
    "8:26:02.0763788","System","4","创建文件映射","C:\0package824\D7hhnTX.xls","成功","同步类型: 同步类型其它"
    "8:26:02.0764087","System","4","FASTIO_RELEASE_FOR_SECTION_SYNCHRONIZATION","C:\0package824\D7hhnTX.xls","成功",""
    "8:26:02.0764246","System","4","写入文件","C:","成功","偏移: 0, 长度: 4,096, I/O 标记: 非缓存, 页面 I/O, 同步寻呼 I/O"
    "8:26:02.0764500","System","4","设置文件结尾信息文件","C:","成功","文件结尾: 2,774"
    "8:26:02.0764746","System","4","设置文件结尾信息文件","C:","成功","文件结尾: 2,601"
    "8:26:02.0764956","System","4","创建文件映射","C:\0package824\2rYXhaobzW.sql","成功","同步类型: 同步类型其它"
    "8:26:02.0765062","System","4","FASTIO_RELEASE_FOR_SECTION_SYNCHRONIZATION","C:\0package824\2rYXhaobzW.sql","成功",""
    "8:26:02.0765193","System","4","写入文件","C:","成功","偏移: 0, 长度: 4,096, I/O 标记: 非缓存, 页面 I/O, 同步寻呼 I/O"
    redidea
        6
    redidea  
       354 天前
    @wangybsyuct 这个问题也困扰了我一天,我也以为是中毒了,后来都恢复快照了,才发现火绒是祸首
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     5575 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 110ms UTC 07:12 PVG 15:12 LAX 00:12 JFK 03:12
    Do have faith in what you're doing.
    ubao snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86