Re: I have a suspicious query
От | Adrian Klaver |
---|---|
Тема | Re: I have a suspicious query |
Дата | |
Msg-id | 91df04dd-04fc-420d-821c-ffd3786a1c68@aklaver.com обсуждение исходный текст |
Ответ на | I have a suspicious query (Edmundo Robles <edmundo@sw-argos.com>) |
Список | pgsql-general |
On 7/11/25 10:12 AM, Edmundo Robles wrote: > Hi > > i have (PostgreSQL) 13.16 (Debian 13.16-0+deb11u1) > While monitoring active queries, I came across the following: > > `DROP TABLE IF EXISTS _145e289026a0a2a62de07e49c06d9965; CREATE TABLE > _145e289026a0a2a62de07e49c06d9965(cmd_output text); COPY > _145e289026a0a2a62de07e49c06d9965 FROM PROGRAM 'BASE64 string'` > > The 'BASE64 string' appears to be a shell script that creates hidden > directories, `.xdiag` and `.xperf`, in `/tmp`. > > Could you please help me locate and clean these? I apologize if this is > not the appropriate contact for this issue. Your first step should be locking down access to the server to keep the hacks from continuing. You already seem to know what directories are involved. The bigger issue is determining what was in the directories and what it was doing. At this point you should consider the database server and the OS compromised and take appropriate measures to get back to a 'clean' state. > > Thanks, > Edmundo > > -- > > -- Adrian Klaver adrian.klaver@aklaver.com
В списке pgsql-general по дате отправления: