• The APS Catalog has been deprecated and removed from all Plesk Obsidian versions.
    Applications already installed from the APS Catalog will continue working. However, Plesk will no longer provide support for APS applications.
  • Please be aware: with the Plesk Obsidian 18.0.78 release, the support for the ngx_pagespeed.so module will be deprecated and removed from the sw-nginx package.

Catalinx hack

yabado

Regular Pleskian
I recently noticed some strange email bounces coming back to my Plesk "test" server. It turns out that the server was hacked. After som investigation I found this site that explains what was compromised...

http://catalinx.org

Here is what it says...

--snip--
NOTICE, THIS DOMAIN WAS USED BY HACKERS FOR ROOTKIT EMAILS,
CHECK /etc/cron.daily/dnsquery,
/etc/cron.daily/distwatch,
/etc/init.d/killd,
/usr/lib/popauth,
/usr/share/misc/blah/ and
your local smtp server for emails to [email protected] or [email protected]


You can check your Linux server for rootkits with any or all of these programs: chkrootkit, rkhunter, unhide.
This Website is NOT RELATED with the hackers.
--snip--

What are some best practices for preventing such an attack in the future?
 
Back
Top