libprocesshider.so installed and added to /etc/ld.so.preload
0
votes
1
answer
696
views
Today I received an alert from AlibabaCloud that
libprocesshider.so
is installed on my bastion server. They told me that it is a backdoor rootkit.
I researched for a bit and found out that libprocesshider.so
is usually used to hide backdoor processes and it's a common practice to add the module to /etc/ld.so.preload
, and it was indeed added on my server.
---
Questions:
- Can I trace all hidden processes that was ran with libprocesshider module?
- How can I track the damages it caused on my servers? I looked into journalctl
, /var/log/secure
and history
, but couldn't find any trace of attack.
- The session that installed libprocesshider.so
is still alive. I think the session was hijacked/stolen from a legit remote user. As the person is currently not connected to the bastion server. Should I kill the session ASAP, or can I trace some information from it?
- Is there a chance that libprocesshider.so
was automatically installed by a non-malware
application?
---
Please feel free to ask if you need more info.
Asked by Lunartist
(405 rep)
Feb 28, 2023, 08:59 AM
Last activity: Feb 28, 2023, 09:57 AM
Last activity: Feb 28, 2023, 09:57 AM