• We value your experience with Plesk during 2024
    Plesk strives to perform even better in 2025. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2024.
    Please take this short survey:

    https://pt-research.typeform.com/to/AmZvSXkx
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.

Issue AbuseIPDB - spurious network activity from our server to third-party networks

weareimpulse

Basic Pleskian
Server operating system version
Ubuntu 22.04.5 LTS
Plesk version and microupdate number
Plesk Obsidian 18.0.65 Update #2 Web Host Edition
hi, does anyone have any advice for our business/server?

we currently have a server that hosts around 40 WordPress sites - and a few months ago, we were contacted by our server providers to say that our server had been reported for complaints of spurious network activity from our server to third-party networks.

We've been through all the WP sites and updated the WP core version, and the plugins to the latest releases but we're still getting reports from:



It was suggested to me to install clamAV on the server, and it has found a couple of infected files:

14 files in /usr
4 in /opt/
and 4 in /etc/


/usr/local/maldetect/sigs/md5v2.dat: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs/md5.dat: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs/hex.dat: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs/rfxn.hdb: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs/rfxn.ndb: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs/rfxn.yara: {HEX}php.gzbase64.inject.457.UNOFFICIAL FOUND
/usr/local/maldetect/clean/gzbase64.inject.unclassed: {HEX}php.gzbase64.inject.457.UNOFFICIAL FOUND
/usr/local/maldetect/sigs.old/md5v2.dat: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs.old/md5.dat: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs.old/hex.dat: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs.old/rfxn.hdb: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs.old/rfxn.ndb: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/usr/local/maldetect/sigs.old/rfxn.yara: {HEX}php.gzbase64.inject.457.UNOFFICIAL FOUND
/usr/local/maldetect/tmp/.runtime.hexsigs.42416: YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
LibClamAV Warning: cli_scanxz: decompress file size exceeds limits - only scanning 27262976 bytes

/etc/apache2/modsecurity.d/rules/owasp_modsecurity_crs_4-plesk/RESPONSE-955-WEB-SHELLS.conf: YARA.lamashell_php.UNOFFICIAL FOUND
/etc/apache2/modsecurity.d/rules/owasp_modsecurity_crs_4-plesk/web-shells-php.data: {HEX}php.cmdshell.antichat.202.UNOFFICIAL FOUND
/etc/nginx/modsecurity.d/rules/owasp_modsecurity_crs_4-plesk/RESPONSE-955-WEB-SHELLS.conf: YARA.lamashell_php.UNOFFICIAL FOUND
/etc/nginx/modsecurity.d/rules/owasp_modsecurity_crs_4-plesk/web-shells-php.data: {HEX}php.cmdshell.antichat.202.UNOFFICIAL FOUND


/opt/psa/admin/plib/modules/revisium-antivirus/library/externals/ai-bolit-hoster.php: {HEX}php.gzbase64.inject.460.UNOFFICIAL FOUND
/opt/psa/admin/plib/modules/revisium-antivirus/library/externals/ai-bolit.php: {HEX}php.gzbase64.inject.460.UNOFFICIAL FOUND
/opt/psa/admin/plib/modules/revisium-antivirus/library/externals/procu2.php: {HEX}php.gzbase64.inject.460.UNOFFICIAL FOUND
/opt/psa/var/modules-packages/revisium-antivirus.zip: {HEX}php.gzbase64.inject.460.UNOFFICIAL FOUND



could these be the culprits?

are these safe to delete??

Any other advice would be greatly appreciated!!!

Many thanks

Tim
 
Back
Top