Page 1 of 2 12 LastLast
Results 1 to 25 of 38
  1. #1
    Join Date
    Mar 2008
    Location
    /usr/bin/kvm
    Posts
    239

    * Hetzner Got Hacked

    Dear Client

    At the end of last week, Hetzner technicians discovered a "backdoor" in one
    of our internal monitoring systems (Nagios).

    An investigation was launched immediately and showed that the administration
    interface for dedicated root servers (Robot) had also been affected. Current
    findings would suggest that fragments of our client database had been copied
    externally.

    As a result, we currently have to consider the client data stored in our Robot
    as compromised.

    To our knowledge, the malicious program that we have discovered is as yet
    unknown and has never appeared before.

    The malicious code used in the "backdoor" exclusively infects the RAM. First
    analysis suggests that the malicious code directly infiltrates running Apache
    and sshd processes. Here, the infection neither modifies the binaries of the
    service which has been compromised, nor does it restart the service which has
    been affected.

    The standard techniques used for analysis such as the examination of checksum
    or tools such as "rkhunter" are therefore not able to track down the malicious
    code.

    We have commissioned an external security company with a detailed analysis of
    the incident to support our in-house administrators. At this stage, analysis
    of the incident has not yet been completed.

    The access passwords for your Robot client account are stored in our database
    as Hash (SHA256) with salt. As a precaution, we recommend that you change your
    client passwords in the Robot.

    With credit cards, only the last three digits of the card number, the card type
    and the expiry date are saved in our systems. All other card data is saved
    solely by our payment service provider and referenced via a pseudo card number.
    Therefore, as far as we are aware, credit card data has not been compromised.

    Hetzner technicians are permanently working on localising and preventing possible
    security vulnerabilities as well as ensuring that our systems and infrastructure
    are kept as safe as possible. Data security is a very high priority for us. To
    expedite clarification further, we have reported this incident to the data
    security authority concerned.

    Furthermore, we are in contact with the Federal Criminal Police Office (BKA) in
    regard to this incident.

    Naturally, we shall inform you of new developments immediately.

    We very much regret this incident and thank you for your understanding and
    trust in us.

    A special FAQs page has been set up at
    http://wiki.hetzner.de/index.php/Security_Issue/en to assist you with further
    enquiries.

    Kind regards

    Martin Hetzner
    - Founder of Backupsy, VPSDime, Winity

  2. #2
    Join Date
    Aug 2007
    Location
    Belgium
    Posts
    3,929
    Let's hope they can find a solution soon. It's not Hetzner that's hacked, it's an issue with Nagios
    InstantDedicated.com - Unmanaged Dedicated Servers with Instant Activation [EU and USA]
    ServerBoost.com - Managed Dedicated Servers with 24x7 On-Site Support [100% Uptime Guarantee]
    ≈ Locations: (The Netherlands) - Tier 3 [Dataplace] | (Miami) - Tier 3 - Pay via: Bitcoin, Paypal, Credit Card, Sofort Banking, Bancontact, Webmoney, iDEAL

  3. #3
    Join Date
    Nov 2011
    Location
    Calgary, Alberta, Canada
    Posts
    676
    Thank god I didn't go with them. Considering they needed government issued identification to verify I am who I am and now that information could've been in the hands of some hacker...
    Little Apps
    Open Source Software

  4. #4
    Join Date
    Mar 2009
    Posts
    389
    And now the entire hetzner network is down!
    EDIT : Back up now, was down for a minute.

  5. #5
    Join Date
    Jan 2011
    Location
    Varna, Bulgaria
    Posts
    1,267
    Again? When / what was the previous one?

  6. #6
    Join Date
    Mar 2008
    Location
    /usr/bin/kvm
    Posts
    239
    Quote Originally Posted by 24x7group View Post
    Let's hope they can find a solution soon. It's not Hetzner that's hacked, it's an issue with Nagios
    Yes, Nagios got hacked, not Hetzner. All user info is safe.
    - Founder of Backupsy, VPSDime, Winity

  7. #7
    Join Date
    Mar 2003
    Location
    California USA
    Posts
    13,259
    The malicious code used in the "backdoor" exclusively infects the RAM. First
    analysis suggests that the malicious code directly infiltrates running Apache
    and sshd processes. Here, the infection neither modifies the binaries of the
    service which has been compromised, nor does it restart the service which has
    been affected.
    This is a fairly poor explanation.
    Steven Ciaburri | Proactive Linux Server Management - Rack911.com
    System Administration Extraordinaire | Follow us on twitter:@Rack911Labs
    Managed Servers (AS62710), Server Management, and Security Auditing.
    www.HostingSecList.com - Security notices for the hosting community.

  8. #8
    Join Date
    Aug 2011
    Location
    Denmark
    Posts
    108
    Honestly, I do not find the content of the above message alarming as such. Simply update your password and you should be fine.

    However if you had them access any of your server(s) in recent times, I would check those servers as well just in case.
    The malicious code used in the "backdoor" exclusively infects the RAM. First
    analysis suggests that the malicious code directly infiltrates running Apache
    and sshd processes. Here, the infection neither modifies the binaries of the
    service which has been compromised, nor does it restart the service which has
    been affected.
    Just my 0.02 - I would love to hear what others have to say though.
    "Learn from yesterday, live for today, hope for tomorrow. The important thing is not to stop questioning." - Albert Einstein

  9. #9
    Ouch. But they atleast don't try to cover it up and most releavant details was given before they get asked about. Some people should take this as example when things go wrong...

  10. #10
    Join Date
    Mar 2009
    Posts
    389
    Quote Originally Posted by rds100 View Post
    Again? When / what was the previous one?
    Last year..

  11. #11
    Join Date
    Aug 2011
    Location
    Denmark
    Posts
    108
    Quote Originally Posted by softshop011 View Post
    Last year..
    Link to this? I am curious and would like to know more.
    "Learn from yesterday, live for today, hope for tomorrow. The important thing is not to stop questioning." - Albert Einstein

  12. #12
    Join Date
    Aug 2011
    Location
    Denmark
    Posts
    108
    "Learn from yesterday, live for today, hope for tomorrow. The important thing is not to stop questioning." - Albert Einstein

  13. #13
    Join Date
    Mar 2009
    Posts
    389
    Quote Originally Posted by MrEliasen View Post
    Link to this? I am curious and would like to know more.
    Looking for the link, thorough analysis of the compromise was posted by German IT specialist.

    Tobias Huch wrote about the compromise/data breach :
    http://www.golem.de/1110/86916.html
    http://www.netzwelt.de/news/88855-in...r-hetzner.html

    There's also a thread on WHT
    http://www.webhostingtalk.com/showthread.php?t=1088324
    Last edited by softshop011; 06-06-2013 at 01:22 PM.

  14. #14
    Join Date
    Aug 2011
    Location
    Denmark
    Posts
    108
    Quote Originally Posted by softshop011 View Post
    Looking for the link, thorough analysis of the compromise was posted by German IT specialist.

    Tobias Huch wrote about the compromise/data breach :
    http://www.golem.de/1110/86916.html
    http://www.netzwelt.de/news/88855-in...r-hetzner.html

    There's also a thread on WHT
    http://www.webhostingtalk.com/showthread.php?t=1088324
    Appreciated, thanks!
    "Learn from yesterday, live for today, hope for tomorrow. The important thing is not to stop questioning." - Albert Einstein

  15. #15
    Quote Originally Posted by softshop011 View Post
    And now the entire hetzner network is down!
    EDIT : Back up now, was down for a minute.
    Yes, even I noticed the same.

  16. #16
    Join Date
    Sep 2006
    Location
    Servers
    Posts
    1,548
    Seems their monitoring is sending now some fake alarms of port 80 down ...
    QHoster.com - Web Hosting with DDoS Protection | Shared & Reseller in Europe/North America
    Linux/Windows RDP VPS - Locations UK, US, CA, BG, LT, FR, DE, NL, CH | OpenVPN/PPTP Enabled
    Instant setup | PayPal, Skrill, Payza, Bitcoin, WebMoney, Perfect Money, STP, Ukash, CashU
    █ Call us: (USA +1) 877 423 1155 | (UK +44) 800 610 1580 | (Skype) : qhoster

  17. #17
    Join Date
    Sep 2008
    Location
    Seattle, WA
    Posts
    1,112
    Quote Originally Posted by serverian View Post
    Yes, Nagios got hacked, not Hetzner. All user info is safe.
    With credit cards, only the last three digits of the card number, the card type
    and the expiry date are saved in our systems. All other card data is saved
    solely by our payment service provider and referenced via a pseudo card number.
    Therefore, as far as we are aware, credit card data has not been compromised.
    Last 3 digits and exp of credit cards compromised, I would say that is user info and probably not all of it.

    edit. I could be mistaken in this, they didn't state clearly if this is just "informational" or this info is compromised.
    Last edited by StealthyHosting; 06-06-2013 at 01:34 PM.
    █ Brian Kearney, Stealthy Hosting Inc. Seattle, WA [AS54931] Skype: StealthyHosting
    Budget Dedicated Servers
    Remote Hands Colocation

    █ Email: Sales(at)StealthyHosting.com Phone: 253-880-1233

  18. #18
    Join Date
    Mar 2008
    Location
    /usr/bin/kvm
    Posts
    239
    Quote Originally Posted by StealthyHosting View Post
    Last 3 digits and exp of credit cards compromised, I would say that is user info and probably not all of it.
    That was sarcasm
    - Founder of Backupsy, VPSDime, Winity

  19. #19
    Join Date
    Nov 2006
    Location
    search.php?do=getnew
    Posts
    1,234
    Threads merged, here's being hopeful for no new ones springing up.

  20. #20
    Join Date
    May 2003
    Location
    Scotland
    Posts
    3,712
    I don't see any unusual activity directed towards my Hetzner equipment at the moment, so hopefully they did not get too much.

    Good to see they came straight out with it though and did not try to hide anything, kudos for that.

  21. #21
    Join Date
    Jun 2012
    Posts
    280
    Quote Originally Posted by serverian View Post
    Yes, Nagios got hacked, not Hetzner. All user info is safe.
    Really?

    An investigation was launched immediately and showed that the administration
    interface for dedicated root servers (Robot) had also been affected. Current
    findings would suggest that fragments of our client database had been copied
    externally.

  22. #22
    Join Date
    Jan 2008
    Location
    Portugal
    Posts
    986
    Lol jeez, I hope Hetzner will get their security issues sorted!

    Sad to see this.
    Miguel Ângelo - Marketing/PR Bachelor - Need Marketing/IT consultation? Contact me for a quote.
    SavvyReady - WebHosting for the Savvy - https://savvyready.com - (UK) Shared and Reseller WebHosting , (USA) KVM VPS and (USA) Dedicated Servers

  23. #23
    Join Date
    Dec 2010
    Location
    127.0.0.1
    Posts
    5,260
    Well at least they aren't hiding it like when Godaddy's DNS was being ddosed and they denied it blamed it on hardware failure.

    Anyway I hope their customers server's haven't been touched.
    Licensecart » Certified Distribution for Blesta, Interworx, Softaculous, SolusVM, LiteSpeed, KernelCare & SSLs
    Billingbrawl.com » Blesta vs WHMCS ~ Round 4 Battle of multi-currency || license.bid » License Marketplace
    Rodney "If there is such a thing as reincarnation, knowing my luck I'll come back as me."

  24. #24
    I found this part most interesting:

    " First analysis suggests that the malicious code directly infiltrates running Apache and sshd processes"

    There was this issue with hacked linux root accounts this year:

    http://www.webhostingtalk.com/showthread.php?p=8702404

  25. #25
    Join Date
    May 2013
    Location
    Florida
    Posts
    385
    I agree. I like that they came right out and admitted everything without trying to make excuses or cover anything up
    Webhostpython.com - Reliable Shared, Reseller, and KVM VPS Hosting Services.
    Dual Hex Core Xeon Powerhouse E5 Series Servers with RAID10 Storage.
    24/7 Support | Live Chat | 1-800-929-9061 | Dallas, TX

Page 1 of 2 12 LastLast

Similar Threads

  1. Staminus /Hetzner /Webtropia Reviews (Bad) Except hetzner
    By gmakhs in forum Dedicated Server
    Replies: 13
    Last Post: 12-03-2012, 02:18 PM
  2. Hacked? We Guarantee Your Website Will Not Be Hacked or Defaced!
    By UNIXy in forum Hosting & Network Security
    Replies: 1
    Last Post: 05-28-2012, 03:09 PM
  3. hetzner review , hetzner company or hetzner swindler
    By fun_9990 in forum Dedicated Server
    Replies: 65
    Last Post: 03-03-2012, 01:11 AM
  4. Hetzner robot apparently hacked
    By wartungsfenster in forum Providers and Network Outages and Updates
    Replies: 1
    Last Post: 10-06-2011, 12:53 PM
  5. Can my blog be hacked on shared hosting if my neighbour is hacked?
    By zobe in forum Hosting Security and Technology
    Replies: 17
    Last Post: 03-10-2011, 04:09 AM

Related Posts from theWHIR.com

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •