挖矿病毒
现象
CPU利用率占满了,或者占50%
解决
ls -la /etc/cron* # 检查系统级定时任务
ls -la /var/spool/cron/crontabs/ # 检查所有用户的 crontab 文件# 里面就可以找到执行的程序
cat /etc/cron.hourly/MuU5g9kkls -la /etc/cron*sudo tail -f /var/log/auth.log # 实时监控登录日志
sudo grep -i "fail|error|attack" /var/log/syslog # 搜索攻击痕迹



sudo apt install rkhunter
sudo rkhunter --check
登陆用户爆破
日志查看
sudo tail -f /var/log/auth.log # 实时监控登录日志
病毒进行字典爆破日志:
Nov 28 11:10:08 u20 sshd[184701]: Invalid user .hlifanuang from 127.0.0.1 port 42542Nov 28 11:10:08 u20 sshd[184701]: pam_unix(sshd:auth): check pass; user unknownNov 28 11:10:08 u20 sshd[184701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1Nov 28 11:10:10 u20 sshd[184701]: Failed password for invalid user lifan.huang from 127.0.0.1 port 42542 ssh2Nov 28 11:10:11 u20 sshd[184701]: Connection closed by invalid user lifan.huang 127.0.0.1 port 42542 [preauth] Nov 28 11:10:15 u20 sshd[184749]: Invalid user jin.wu from 127.0.0.1 port 38136Nov 28 11:10:15 u20 sshd[184749]: pam_unix(sshd:auth): check pass; user unknownNov 28 11:10:15 u20 sshd[184749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1Nov 28 11:10:17 u20 sshd[184749]: Failed password for invalid user jin.wu from 127.0.0.1 port 38136 ssh2Nov 28 11:10:19 u20 sshd[184749]: Connection closed by invalid user jin.wu 127.0.0.1 port 38136 [preauth] Nov 28 11:10:23 u20 sshd[184886]: Invalid user qing.li from 127.0.0.1 port 34480Nov 28 11:10:23 u20 sshd[184886]: pam_unix(sshd:auth): check pass; user unknownNov 28 11:10:23 u20 sshd[184886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1Nov 28 11:10:24 u20 sshd[184886]: Failed password for invalid user qing.li from 127.0.0.1 port 34480 ssh2Nov 28 11:10:25 u20 sshd[184886]: Connection closed by invalid user qing.li 127.0.0.1 port 34480 [preauth] Nov 28 11:10:30 u20 sshd[184936]: Invalid user wenliu.zhu from 127.0.0.1 port 59566
可以看到有常用的用户名进行不停的尝试
解决
# 安装 Fail2Ban 自动封禁爆破 IP
sudo apt install fail2ban
sudo systemctl enable fail2ban
sudo systemctl start fail2ban