Break-In attempt on

Dear Users: on Friday evening, July 3rd (UTC) we found a few suspicious files on the CentOS webserver. Upon investigating we found out that the files had been put there through Xoops (the CMS runs on) - and that this was possible due to a an administrative error which has been corrected.

As far as we can see there has been no data or binary injected into the system or taken from the system. The machine hasn’t been used as a source for sending spam (in the widest possible meaning) either.

We have been able to identify the source of the attacks, but have not been able to find out if the files have been put there through a compromised user account in the Xoops system. Although we are fairly sure that there has been no such compromise, we have enforced a password expiry on all accounts on the system. and - though being on the same machine - have not been affected by this.

All users having an account on need to acquire a new password through the “lost password” system of Xoops.

We are terribly sorry for any inconvenience this might cause you and would like to apologize for that.

Geschrieben um 03:22

[/centos] [permanent link] [Startseite]

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 2.0 Germany License.