• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.

New exploit in the wild?

P

placain

Guest
Someone logged in to my site today (from Romania, according to the log - I'm in the US) and created a bunch of spam domains. (One was "powder.biz", which is registered to someone in Pakistan...")

There is no possible way they could have guessed my password - before I changed it, it was U2Pvf$k_3x.

I am extraordinarily careful about my password - I only ever log in to my Plesk install from my home computer, and only over https.

This leads me to one conclusion - there's an exploit in the wild. Has anyone else started seeing this?
 
Plesk admin password is in /etc/psa/.psa.shadow, maybe they got this file.
 
-rw------- 1 psaadm psaadm 8 Jun 29 17:42 .psa.shadow

Am I correct that in order to read that file they would have to be root on my machine?

That's an even worse problem, if so...
 
Check your /tmp for funny files, run RKHunter and Chkrootkit. Sounds like it's time for a serious security check.
 
In the mean while you can adjust your firewall module only to allow management traffic to your plesk box from your home (fixed IP).

Set this for both ssh and admin https and you have some extra time to fix your problems.
 
Back
Top