Position: Home page » Equipment » The server was attacked and used for mining

The server was attacked and used for mining

Publish: 2021-05-25 12:11:25
1.

a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,

will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of

client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server

{rrrrrrr}

mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.

careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine

a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease

virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,

do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack

in the later stage

through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,

sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server

runs stably, and the network station opens normally

2. Alibaba cloud provides infrastructure services and uses server resources on demand. However, security defense enterprises must also pay attention to it. They should not think that they are absolutely safe after they are on the cloud. Alibaba cloud provides up to 5g free defense against DDoS traffic attacks. If the security policy is higher, they need to buy advanced defense IP
your situation should be that there are no better security measures when you are attacked. When the attack reaches a certain level, the staff will shut it down to prevent greater losses.
3. 1. If you are under the age of 16, you do not have to bear criminal responsibility, but your guardian will be responsible for the loss caused by your behavior; If you are over 16 and under 18, you should bear the responsibility, but you should be given a lighter or mitigated punishment
3. If the server has recovered and no important data has been lost, it just means that the loss is small, but not without loss. Even if no data has been lost, there is also a loss, because the time that causes the server not to run is part of the loss

the following are the relevant penalties. Please compare them< Article 285 of the criminal law; Crime of illegally obtaining data of computer information system and illegally controlling computer information system; Whoever, in violation of state regulations, intrudes into a computer information system in the fields of state affairs, national defense construction or cutting-edge science and technology shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention

Whoever, in violation of state regulations, intrudes into a computer information system other than the provisions of the preceding paragraph, or uses other technical means to obtain data stored, processed or transmitted in the computer information system, or illegally controls the computer information system, if the circumstances are serious, shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention and shall also, or shall only, be fined; If the circumstances are especially serious, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years and shall also be fined

those who provide special programs or tools for intruding into or illegally controlling computer information systems, or who provide programs or tools for others knowing that they have committed an illegal or criminal act of intruding into or illegally controlling computer information systems, if the circumstances are serious, shall be punished in accordance with the provisions of the preceding paragraph< Article 286 Whoever, in violation of state regulations, deletes, modifies, increases or interferes with the functions of a computer information system, thus causing the computer information system to fail to operate normally, with serious consequences, shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention; If the consequences are especially serious, they shall be sentenced to fixed-term imprisonment of not less than five years

Whoever, in violation of state regulations, deletes, modifies or adds data and applications stored, processed or transmitted in the computer information system, if the consequences are serious, shall be punished in accordance with the provisions of the preceding paragraph

those who deliberately make or spread destructive programs such as computer viruses, which affect the normal operation of the computer system, and have serious consequences, shall be punished in accordance with the provisions of the first paragraph< Article 29 of the law of the people's Republic of China on administrative penalties for public security, whoever commits one of the following acts shall be detained for not more than five days; If the circumstances are serious, they shall be detained for not less than five days but not more than 10 days:
(1) violating state regulations, invading the computer information system and causing harm< (2) deleting, modifying, adding or interfering with the functions of a computer information system in violation of state regulations, resulting in the abnormal operation of the computer information system< (3) deleting, modifying or adding data and applications stored, processed or transmitted in computer information systems in violation of state regulations< (4) deliberately making and spreading destructive programs such as computer viruses, which affect the normal operation of computer information systems.
4. Ray: first, strengthen
ray, Thor wakes up, attack speed + 2. Originally, the speed is high...
the power replenishment attribute 100% changes its own attack and special attack level + 1
the electric light barrier attribute 100% changes its own defense and special defense level + 1
charging attribute 1 round of power damage multiplied by 2
power storm attribute the next 2 rounds must be a fatal hit
the spring of power attribute self attack + 2
this is Teri's enhanced move, Every one of them doesn't accelerate... But, they fight each other, they both kill each other. Ray, good speed! Skill:
ray: lightning flash level 70, power 150
Yuanqi electric light ball special, power 140
Aurora blade power 130, ordinary physical attack, make all enhancement effects disappear
white light blade level 55, power 95, easy to hit a fatal blow
this is Ray's trump card skill, Very strong
Terry:
thunderbolt 120 5% paralyzes pp10
thunderbolt 150 10% paralyzes PP5
thunderbolt tooth 100 10% paralyzes pp15
thunderbolt 75 10% paralyzes pp15 first hand skill
one strike with all strength 120 PP5
thunderbolt No characteristics...
I don't need to say that, do I? You can compare it yourself
3. Race value:

Terry race value:
physical strength: 125
attack: 120
special attack: 77
speed: 90
defense: 95
Special Defense: 77
total: 584
ray: physical strength: 71 attack: 108 defense: 70 special attack: 101 special defense: 77 speed: 105, extreme attack: 347, speed: 340, very strong
Terry's physical attack, Ray's fast attack and special attack< 4. Actual combat:
ray wakes up in round 1
Teri takes a big move
ray takes a fatal strike in round 2 with Aurora blade
Teri hangs the lottery... (3 seconds of silence)
5. Appearance:
we all know that ray is the most handsome in the cel, and AK is the second
Terry..... I don't think it's very good-looking..... A fat man
ray has the style of king, this round goes without saying
5:0, ray wins<

the main spirit: thunderbolt
the Deputy spirit: Luke
fusion material: casually

it's a painstaking effort to choose an amount
people who plagiarize downstairs go to s!!!!!!
5. White character attack refers to your character's Whiteboard attribute + basic attribute of equipment (including enhancement). For example, if you have a skill with attack power increased by 50%, the increase is 50% of the white character value. If you move the mouse to the green value of attack power in the character panel attribute, a white character + green character will appear
the green word attack is your magic stone or something. It will also affect the damage, but the ability to increase the percentage of the attack will not be multiplied by the green word attack.
6. The calculation formula is speculation, and the official did not give any calculation method
at present, the most reasonable thing is,
attack power * skill damage * skill attack power * YELLOW character * extra yellow character * explosive damage * extra explosive damage * final damage * white character. Attribute damage has never been calculated for so many years, and there is little deviation without considering it.
7. If you are a sword soul with seven injury sets, the scarlet letter will be
high-strength, and you can draw a sword in any second.
this is the effect of the skill attack power bonus

but if you are your number, it's useless to take it with you
8. These three don't conflict. Skill attack power multiplication and all attack power addition will be diluted just like white words.
9. The green character is a normal attack bonus, while the skills don't add attack. For example, sword star's assault stance, while the white character is a bonus for all attacks. Sorry for the poor language in the first answer
10. No conflict. In DNF, there are several kinds of bonus that will not conflict. One is white damage, that is, additional damage, and the bonus of surface attack power and skill attack power. These three kinds of bonus will not conflict with other bonus
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750