Hi,
we are facing issues with some hacked CTs.
We already had that issue with openvz6 and openvz7 earlier when we used SolusVM.
These process looking like this from node view:
http://prntscr.com/k2s1mp
When we strace these processes from inside the container, we see that it clones itself every second into /usr/bin/ with random process names.
These processes often send much outbound traffic, so seems like these are infected servers used in a botnet or something like this.
Did you ever hear about that issue? Strace:
http://prntscr.com/k2s2cc
Once the process was killed, it duplicates itself within some seconds.
Any idea to protect those containers or even handle that issue directly from the node?
Thank you
we are facing issues with some hacked CTs.
We already had that issue with openvz6 and openvz7 earlier when we used SolusVM.
These process looking like this from node view:
http://prntscr.com/k2s1mp
When we strace these processes from inside the container, we see that it clones itself every second into /usr/bin/ with random process names.
These processes often send much outbound traffic, so seems like these are infected servers used in a botnet or something like this.
Did you ever hear about that issue? Strace:
http://prntscr.com/k2s2cc
Once the process was killed, it duplicates itself within some seconds.
Any idea to protect those containers or even handle that issue directly from the node?
Thank you